Journal: Information Systems Security

Volume 3, Issue 4

3 -- 4Donn B. Parker. From the Editor
5 -- 10Harry B. DeMaio. Information Protection and Business Process Reengineering
11 -- 15Wayne Madsen. Information Police on the Internet
16 -- 20Donn B. Parker. Security Accountability in Job Performance
21 -- 25Gary Benesko, Philip Teplitzky. EDI Integrity Controls
27 -- 29Michael I. Sobol. Products Used to Secure Networked Macintosh Computers
30 -- 33William Hugh Murray. Modern Cryptography
34 -- 41Ed Sawicki. Securing NetWare Against Trojan Horse Attacks
42 -- 51William M. Hancock. Dial-Up Modem Protection Schemes
52 -- 58Kirby G. Dickson. Information Anarchy and the Control of Cryptography
59 -- 68Mary Ann Davidson. Security in an Oracle Data Base Environment