Journal: Information Systems Security

Volume 1, Issue 4

3 -- 0Donn B. Parker. From the Editor
7 -- 11Harry B. DeMaio. Building Enterprisewide Alliances
12 -- 15Lance J. Hoffman. Bugging the Digital Network
16 -- 19Donn B. Parker. Putting Hacker Crime in Perspective
20 -- 23Philip Teplitzky. The Weak Link in Distributed Data Base Security
24 -- 27Cole Emerson. Developments in Security and Recovery Certification
28 -- 32Michael I. Sobol. Disaster Recovery Planning Software
33 -- 37Robert R. Moeller. Information Security: Basic to Specialized Topics
38 -- 50Teresa F. Lunt. Automated Instruction Detection
51 -- 59James E. Molini. Building an Automated Security Monitor
60 -- 73David L. Anderson. Securing the OS/2 Operating Environment
75 -- 84Hal Tipton. Certification of Security Practitioners

Volume 1, Issue 1

3 -- 0Donn B. Parker. From The Editor
5 -- 8Harry B. DeMaio. The Case for Integrating Quality, Security, and Continuity Programs
9 -- 12Fred W. Weingarten. Cryptography and National Security
13 -- 16Donn B. Parker. Teaching the Ethical Use of Information Assets
17 -- 19Ralph Spencer Poore. Ensuring the Timely Destruction of Information
20 -- 22John D. Podesta. The Dangers of Legislating Controls on Information Technology
23 -- 26Michael I. Sobol. Callback Security
27 -- 30Robert R. Moeller. Computer Viruses
31 -- 41Angel L. Rivera. Micro-Mainframe Security
42 -- 49George E. Biles, David Allen Mann. Software Law and Its Perils : Copyright, Patent, and the Racketeering Statute
50 -- 57Tobie Finzel. Trends in Operating System Security
58 -- 65A. Padgett Peterson. Counteracting Viruses in an MS-DOS Environment
66 -- 71John R. Muir. ID Verification in Integrated Systems