researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
1
, Issue
4
3
--
0
Donn B. Parker
.
From the Editor
7
--
11
Harry B. DeMaio
.
Building Enterprisewide Alliances
12
--
15
Lance J. Hoffman
.
Bugging the Digital Network
16
--
19
Donn B. Parker
.
Putting Hacker Crime in Perspective
20
--
23
Philip Teplitzky
.
The Weak Link in Distributed Data Base Security
24
--
27
Cole Emerson
.
Developments in Security and Recovery Certification
28
--
32
Michael I. Sobol
.
Disaster Recovery Planning Software
33
--
37
Robert R. Moeller
.
Information Security: Basic to Specialized Topics
38
--
50
Teresa F. Lunt
.
Automated Instruction Detection
51
--
59
James E. Molini
.
Building an Automated Security Monitor
60
--
73
David L. Anderson
.
Securing the OS/2 Operating Environment
75
--
84
Hal Tipton
.
Certification of Security Practitioners
Volume
1
, Issue
1
3
--
0
Donn B. Parker
.
From The Editor
5
--
8
Harry B. DeMaio
.
The Case for Integrating Quality, Security, and Continuity Programs
9
--
12
Fred W. Weingarten
.
Cryptography and National Security
13
--
16
Donn B. Parker
.
Teaching the Ethical Use of Information Assets
17
--
19
Ralph Spencer Poore
.
Ensuring the Timely Destruction of Information
20
--
22
John D. Podesta
.
The Dangers of Legislating Controls on Information Technology
23
--
26
Michael I. Sobol
.
Callback Security
27
--
30
Robert R. Moeller
.
Computer Viruses
31
--
41
Angel L. Rivera
.
Micro-Mainframe Security
42
--
49
George E. Biles
,
David Allen Mann
.
Software Law and Its Perils : Copyright, Patent, and the Racketeering Statute
50
--
57
Tobie Finzel
.
Trends in Operating System Security
58
--
65
A. Padgett Peterson
.
Counteracting Viruses in an MS-DOS Environment
66
--
71
John R. Muir
.
ID Verification in Integrated Systems