Journal: Information Systems Security

Volume 2, Issue 2

3 -- 4Donn B. Parker. From the Editor
5 -- 9Harry B. DeMaio. Taking Fax Security Seriously
10 -- 14Donn B. Parker. A Comprehensive List of Threats To Information
15 -- 18Philip Teplitzky. Security in a Client/Server Environment
19 -- 23Cole Emerson. Facing the Challenge of Vital Records Recovery
24 -- 28Michael I. Sobol. An Overview of Encryption Products
29 -- 32William Hugh Murray. Surveys of Information Security
33 -- 42Allen B. Lum. Securing UNIX-Based Networks
43 -- 50Robert P. Campbell. Hands-On Penetration Testing of Systems Controls
51 -- 62Gilbert W. Joseph, Terry J. Engle. Controlling the Data Base Administrator
63 -- 71David S. Bauer. Cost-Effective Development of Secure Applications