


default search action
Information Management & Computer Security, Volume 6
Volume 6, Number 1, 1998
- R. K. R. P. Puthli:

METANET: a five-year Internet strategy. 3-14 - H. Joseph Wen:

From client/server to intranet. 15-20 - Carrie Liddy, Alice Sturgeon:

Seamless secured transactions. 21-27 - Gregory Morwood:

Business continuity: awareness and training programmes. 28-32 - Pauline Ratnasingham:

Internet-based EDI trust and security. 33-39
Volume 6, Number 2, 1998
- Han T. M. van der Zee:

Rejuvenating the IT supply organization. 55-65 - H. Joseph Wen:

Internet computer virus protection policy. 66-71 - Lynette Barnard, Rossouw von Solms:

The evaluation and certification of information security against BS 7799. 72-77 - David Thompson:

1997 computer crime and security survey. 78-101
Volume 6, Number 3, 1998
- Ernest-Jan Mutsaers, Han T. M. van der Zee, Henrik Giertz:

The evolution of information technology. 115-126 - Thornton May:

Strategic ignorance: the new competitive high ground. 127-128 - Kent D. Larson:

The role of service level agreements in IT service delivery. 128-132 - Bruce Schneier:

Security pitfalls in cryptographic design. 133-137 - Donald R. Moscato:

Database gateway processor risk analysis using fuzzy logic. 138-144
Volume 6, Number 4, 1998
- Fritz H. Grupe, James M. Hensley, Jeanne H. Yamamura:

Watching systems in action: security at the periphery. 155-159 - Margaret A. Hurley:

Features and functions overload. 160-161 - Pauline Ratnasingham:

Trust in Web-based electronic commerce security. 162-166 - M. E. Thomson, Rossouw von Solms:

Information security awareness: educating your users effectively. 167-173 - Rossouw von Solms:

Information security management (1): why information security is so important. 174-177 - H. Joseph Wen, Jyh-Horng Michael Tarn:

Internet security: a case study of firewall selection. 178-184
Volume 6, Number 5, 1998
- Susan Cramm, Thornton May:

Accelerating executive development: hey coach ... 196-198 - Douglas Brockway, Margaret A. Hurley:

Achieving IT success. 199-204 - Victor Portougal, Lech J. Janczewski

:
Industrial information-weight security models. 205-211 - Les Labuschagne

, Jan H. P. Eloff:
Real-time risk analysis using Java concepts. 212-217 - Stephen Wilson:

Some limitations of web of trust models. 218-220 - Rossouw von Solms:

Information security management (2): guidelines to the management of information technology security (GMITS). 221-223 - Rossouw von Solms:

Information security management (3): the Code of Practice for Information Security Management (BS 7799). 224-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














