researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
3
, Issue
4
3
--
4
Donn B. Parker
.
From the Editor
5
--
10
Harry B. DeMaio
.
Information Protection and Business Process Reengineering
11
--
15
Wayne Madsen
.
Information Police on the Internet
16
--
20
Donn B. Parker
.
Security Accountability in Job Performance
21
--
25
Gary Benesko
,
Philip Teplitzky
.
EDI Integrity Controls
27
--
29
Michael I. Sobol
.
Products Used to Secure Networked Macintosh Computers
30
--
33
William Hugh Murray
.
Modern Cryptography
34
--
41
Ed Sawicki
.
Securing NetWare Against Trojan Horse Attacks
42
--
51
William M. Hancock
.
Dial-Up Modem Protection Schemes
52
--
58
Kirby G. Dickson
.
Information Anarchy and the Control of Cryptography
59
--
68
Mary Ann Davidson
.
Security in an Oracle Data Base Environment
Volume
3
, Issue
3
3
--
4
Donn B. Parker
.
From the Editor
5
--
10
Harry B. DeMaio
.
Information Security: Behind the Telecommuting Power Curve
11
--
15
Wayne Madsen
.
International ITSEC Standards: INTEL Isn't Inside
16
--
22
Donn B. Parker
.
Update on Cryptography: Who Will Keep the Keys?
23
--
26
Ralph Spencer Poore
.
Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places
27
--
31
Michael I. Sobol
.
Data Encryption
32
--
36
Robert R. Moeller
.
Communications Security, LAN Security, and Viruses
37
--
44
Dan G. Erwin
.
The Thirty-Minute Risk Analysis
45
--
52
Joseph Piazza
.
A Multilevel Strategy for Combatting Viruses
53
--
63
Sandra M. Lambert
.
Exploiting the Power of Message Authentication Codes
64
--
71
James E. Molini
.
The New Frontier: Clieht/Server and Agent Technology
Volume
3
, Issue
2
3
--
0
Donn B. Parker
.
From the Editor
5
--
9
Harry B. DeMaio
.
Groupware - Hazardous to Your Health?
10
--
14
Wayne Madsen
.
Net-Jacking on the National Information Highway
15
--
19
Gary Benesko
,
Philip Teplitzky
.
Security and Controls for EDI
20
--
23
Geoffrey W. Turner
.
Cryptography: Beyond Computer Crime
24
--
29
Michael I. Sobol
.
Anti-Virus Software
30
--
35
William Hugh Murray
.
Five Views of the Common Body of Knowledge
36
--
44
Ray Kaplan
,
Glen Zorn
,
Joe Kovara
.
Planning and Implementing Kerberos for Large Distributed Systems: Part 2
47
--
55
Robert E. Smith
.
Proactive Solutions for Multinetwork Security
56
--
64
Martha Stansell-Gamm
.
Responding to Computer Crime: A Security Practitioner's Guide
65
--
74
Ralph Spencer Poore
.
Reference Monitor Technology: Watching Your Every Keystroke
75
--
86
Donn B. Parker
.
A Guide to Selecting and Implementing Security Controls
Volume
3
, Issue
1
3
--
4
Donn B. Parker
.
From the Editor
5
--
10
Harry B. DeMaio
.
Information Protection Standards in the 1990s: Part 2
11
--
16
Wayne Madsen
.
Protecting Business Secrets in an EDI/CALS Environment
17
--
22
Donn B. Parker
.
Demonstrating the Elements of Information Security with Loss Scenarios
23
--
24
Gordon Fielding
.
Electronic Eavesdropping: Solutions in Search of a Problem
25
--
30
Michael I. Sobol
.
Products for Media Backup and Recovery
31
--
34
Robert R. Moeller
.
Two New Books on UNIX and Data Base Security
35
--
44
Ray Kaplan
,
Joe Kovara
,
Glen Zorn
.
Planning and Implementing Kerberos for Large Distributed Systems Part 1
45
--
56
Larry Runge
.
Security and Data Integrity in a Client-Server Environment
57
--
70
Addison Fischer
.
Public Key Cryptography in Action
71
--
81
Micki Krause
.
Writing a Communications Security Policy