researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Issue
Volume
3
, Issue
4
3
--
4
Donn B. Parker
.
From the Editor
5
--
10
Harry B. DeMaio
.
Information Protection and Business Process Reengineering
11
--
15
Wayne Madsen
.
Information Police on the Internet
16
--
20
Donn B. Parker
.
Security Accountability in Job Performance
21
--
25
Gary Benesko
,
Philip Teplitzky
.
EDI Integrity Controls
27
--
29
Michael I. Sobol
.
Products Used to Secure Networked Macintosh Computers
30
--
33
William Hugh Murray
.
Modern Cryptography
34
--
41
Ed Sawicki
.
Securing NetWare Against Trojan Horse Attacks
42
--
51
William M. Hancock
.
Dial-Up Modem Protection Schemes
52
--
58
Kirby G. Dickson
.
Information Anarchy and the Control of Cryptography
59
--
68
Mary Ann Davidson
.
Security in an Oracle Data Base Environment