


default search action
Computers & Security, Volume 1
Volume 1, Number 1, January 1982
- Harold Joseph Highland:

Editorial. 1-2 - Samantha Fordyce:

Computer security: A current assessment. 9-16 - William E. Perry:

Developing a computer security and control strategy. 17-26 - Louis C. Guillou, Bernard Lorig:

Cryptography and teleinformatics. 27-33 - Stanley Friedman:

Contingency and disaster planning. 34-40 - Jay BloomBecker:

International computer crime: Where terrorism and transborder data flow meet. 41-53 - Sigmund N. Porter:

A password extension for improved human factors. 54-56 - Stanley A. Kurzban:

A selective, briefly annotated bibliography of works on data security and privacy. 57-64 - Charles Cresson Wood:

Future applications of cryptography. 65-71 - Michael Willett:

A tutorial on public key cryptography. 72-79 - Paul S. Henry:

Fast decryption algorithm for the knapsack cipher. 80-83
Volume 1, Number 2, June 1982
- Harold Joseph Highland:

Editorial. 95 - Robert H. Courtney Jr.:

A systematic approach to data security. 99-112 - Rolf Blom, Jan-Olof Brüer, Viiveke Fåk, S. Ingvar Åkersten:

On security measures in distributed computer systems. 113-122 - John M. Carroll:

The control of computer-based fraud. 123-138 - Charles Cresson Wood:

Policies for deterring computer abuse. 139-145 - Rolf Moulton:

A multidisciplinary approach to the investigation of computer abuse incidents. 146-151 - William Neugent:

Teaching computer security: A course outline. 152-163 - Esther Harris Highland, Harold Joseph Highland:

A guide to NBS computer security literature. 164-176 - Michael Willett:

Cryptography old and new. 177-186 - Harold Joseph Highland:

Managing information security: A program for the electronic information age : James A. Schweitzer Boston: Butterworth (Publishers), Inc., 1982. vi + 133 pp. $15.95. 191 - Harold Joseph Highland:

Management guide to computer security : J.R. Talbot New York: John Wiley & Sons, 1981. xi + 180 pp. $29.95. 191-192 - Esther H. Highland:

System security standard for electronic data processing : Rolf Moulton New York: The city of New York, 1981. $7.50. 192
Volume 1, Number 3, November 1982
- William Hugh Murray:

Security procedures for program libraries. 201-209 - James K. Shaw, Stuart W. Katzke:

An executive guide to ADP contingency planning. 210-215 - Leslie D. Ball, Gail Dentch, Mary Emerson, Martha Lewis, Susan McWhorter, Frank Turgeon:

Disaster recovery services. 216-225 - Christer Lindén, Hans Block:

Sealing electronic money in Sweden. 226-230 - Susan K. Reed, Dennis K. Branstad:

Reflections on ten years of computer security. 231-232 - Harold Joseph Highland:

Editor's note. 242 - Michael Willett:

Guest editorial. 243-244 - David Kahn:

The grand lines of cryptology's development. 245-248 - R. Creighton Buck:

The public cryptography study group. 249-254 - Dennis K. Branstad, Miles E. Smid:

Integrity and security standards based on cryptography. 255-260 - Subodh K. Banerjee:

High speed implementation of DES. 261-267 - Brian P. Schanning:

Applying public key distribution to local area networks. 268-274 - Nikil S. Jayant:

Analog scramblers for speech privacy. 275-289 - Management guide to computer security : J.P. Talbot: New York: John Wiley and Sons, 1981. xi + 180 pp. $29.95. 290-291

- Multi-national computer systems: An introduction to transnational data flow and data regulation : Harry S. Katzan, Jr.: New York: Van Nostrand Reinhold Co., 1980. xii + 198 pp. $16.95. 291-292


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














