researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
16
, Issue
8
650
--
656
Pauline Ratnasingham
.
EDI security - re-evaluation of controls and its implications on the organizations
657
--
662
Gerald L. Kovacich
.
How to market yourself as an ISSO
663
--
668
Alasdair Kemp
.
Embedded systems: The other problem
669
--
674
Andrew J. Clark
.
Key recovery - why, how, who?
687
--
708
Thomas H. Hinke
,
Harry S. Delugach
,
Randall P. Wolf
.
Protecting databases from inference attacks
709
--
719
Dimitris Gritzalis
.
A baseline security policy for distributed healthcare information systems
Volume
16
, Issue
7
570
--
571
.
From the editor
572
--
582
Donn B. Parker
.
The strategic values of information security in business
583
--
589
Nigel Hickson
.
Encryption policy - A UK perspective
590
--
594
Chris Pounder
.
First steps towards a european union policy on the securing of electronic communications
595
--
602
Andy Jones
.
Penetration testing and system audit - experience gained during the investigation of systems within the UK
603
--
609
John Sherwood
.
Managing security for outsourcing contracts
610
--
618
Gerald L. Kovacich
.
Information systems security metrics management
629
--
641
Julie Bunnell
,
John Podd
,
Ron Henderson
,
Renee Napier
,
James Kennedy-Moffat
.
Cognitive, associative and conventional passwords: Recall and guessing rates
Volume
16
, Issue
6
452
--
453
.
From the editor
455
--
458
Gerald L. Kovacich
.
ISSO career development
469
--
479
Thomas Finne
.
Information security implemented in: The theory on stock market efficiency, Markowitz s portfolio theory and porter s value chain
481
--
506
Rosario Gennaro
,
Paul A. Karger
,
Stephen M. Matyas
,
Mohammad Peyravian
,
Allen Roginsky
,
David Safford
,
Michael Willett
,
Nevenko Zunic
.
Two-phase cryptographic key recovery system
543
--
549
Les Labuschagne
,
Jan H. P. Eloff
.
Improved system-access control using complementary technologies
551
--
563
Simon N. Foley
.
Building Chinese walls in standard unix:::TM:::
Volume
16
, Issue
5
350
--
355
John Meyer
.
Professor Harold Joseph Highland FICS, FACM
356
--
364
.
Random bits & bytes
365
--
368
Harold Joseph Highland
.
The threats on the web
369
--
386
Harold Joseph Highland
.
Data encryption: A non-mathematical approach
387
--
411
Harold Joseph Highland
.
Historical bits & bytes
412
--
415
Harold Joseph Highland
.
A history of computer viruses - Introduction
416
--
429
Harold Joseph Highland
.
A history of computer viruses - The famous trio
430
--
438
Harold Joseph Highland
.
A history of computer viruses: Three special viruses
439
--
449
Harold Joseph Highland
.
Procedures to reduce the computer virus threat
Volume
16
, Issue
4
266
--
275
Harold Joseph Highland
.
Random bits & bytes
277
--
284
Tom Mulhall
.
Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology
285
--
290
Tom Mulhall
.
Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem
291
--
297
Tom Mulhall
.
Where have all the hackers gone?: Part 3 - Motivation and deterrence
298
--
303
Tom Mulhall
.
Where have all the hackers gone?: Part 4 - Legislation
304
--
306
Tom Mulhall
.
Where have all the hackers gone?: Part 5 - Conclusions
307
--
315
Tom Mulhall
.
Where have all the hackers gone?: Part 6 - Appendices and bibliography
316
--
320
Charles Cresson Wood
.
A management view of internet electronic commerce security
321
--
326
Gerald L. Kovacich
.
The ISSO must understand the business and management environment
339
--
344
Chih-Hung Wang
,
Tzonelih Hwang
.
Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication
Volume
16
, Issue
3
189
--
196
James E. Molini
.
Electronic borders: Defining and protecting national networks
197
--
204
Thomas Finne
.
What are the information security risks in decision support systems and data warehousing?
205
--
0
Harold Joseph Highland
.
IFIP/SEC 97 conference proceedings
223
--
232
Zbigniew Ciechanowicz
.
Risk analysis: requirements, conflicts and problems
233
--
257
Ivan Krsul
,
Eugene H. Spafford
.
Authorship analysis: identifying the author of a program
Volume
16
, Issue
2
94
--
114
Fred Cohen
.
Information system defences: A preliminary classification scheme
115
--
125
Stephane G. Bouniol
.
The puzzle theorem - The less I know, the less I can disclose ..
137
--
144
Dennis M. Volpano
,
Cynthia E. Irvine
.
Secure flow typing
145
--
164
O. Tettero
,
D.-J. Out
,
Henry M. Franken
,
J. Schot
.
Information security embedded in the design of telematics systems
Volume
16
, Issue
1
2
--
3
John Meyer
.
From the editor
4
--
13
Harold Joseph Highland
.
Random bits & bytes & bytes
14
--
24
Gerald L. Kovacich
.
Information warfare and the information systems security professional
29
--
46
Fred Cohen
.
Information system attacks: A preliminary classification scheme
47
--
59
Harold Joseph Highland
.
Current literature The 19th National Information Systems Security Conference
71
--
79
Ben Soh
,
Tharam S. Dillon
.
System intrusion processes: a simulation model