| 185 | -- | 186 | Harold Joseph Highland. Editorial : Office automation or on the value of being a dinosaur |
| 189 | -- | 205 | Fred Cohen. A secure computer network design |
| 207 | -- | 210 | Jean-Pierre Chamoux. Data security and confidentiality in Europe |
| 211 | -- | 218 | Józef P. Pieprzyk, Dominik Rutkowski. Modular design of information encipherment for computer systems |
| 219 | -- | 222 | Belden Menkus. The impact of the Bell system breakup on DP disaster recovery planning |
| 223 | -- | 228 | Charles Cresson Wood. Floppy diskette security measures |
| 245 | -- | 246 | Harold Joseph Highland. U.S. computer crime legislation highlighted in special report |
| 247 | -- | 248 | Harold Joseph Highland. Managing risk: A computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, $18.95 |
| 247 | -- | 0 | Harold Joseph Highland. Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, $19.95 |
| 248 | -- | 249 | Charles Cresson Wood. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 |
| 249 | -- | 0 | Harold Joseph Highland. Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US $46.25 |
| 249 | -- | 0 | Esther Harris Highland. Transborder data flows: access to the international on-line data-base market : Amsterdam: North-Holland, 1984. 130 + xiv pages, Dfl 75.00/ US $28.75 |
| 249 | -- | 250 | Esther Harris Highland. Proceedings of the seventh computer security group conference : Washington: US government printing office, 1984 - 776-101/1027. 115 pages |