


default search action
Information Systems Security, Volume 3
Volume 3, Number 1, 1994
- Donn B. Parker:

From the Editor. 3-4
- Harry B. DeMaio:

Information Protection Standards in the 1990s: Part 2. 5-10
- Wayne Madsen:

Protecting Business Secrets in an EDI/CALS Environment. 11-16
- Donn B. Parker:

Demonstrating the Elements of Information Security with Loss Scenarios. 17-22
- Gordon Fielding:

Electronic Eavesdropping: Solutions in Search of a Problem. 23-24
- Michael I. Sobol:

Products for Media Backup and Recovery. 25-30
- Robert R. Moeller:

Two New Books on UNIX and Data Base Security. 31-34
- Ray Kaplan, Joe Kovara, Glen Zorn:

Planning and Implementing Kerberos for Large Distributed Systems Part 1. 35-44 - Larry Runge:

Security and Data Integrity in a Client-Server Environment. 45-56 - Addison Fischer:

Public Key Cryptography in Action. 57-70 - Micki Krause:

Writing a Communications Security Policy. 71-81
Volume 3, Number 2, 1994
- Donn B. Parker:

From the Editor. 3
- Harry B. DeMaio:

Groupware - Hazardous to Your Health? 5-9
- Wayne Madsen:

Net-Jacking on the National Information Highway. 10-14
- Gary Benesko, Philip Teplitzky:

Security and Controls for EDI. 15-19
- Geoffrey W. Turner:

Cryptography: Beyond Computer Crime. 20-23
- Michael I. Sobol:

Anti-Virus Software. 24-29
- William Hugh Murray:

Five Views of the Common Body of Knowledge. 30-35
- Ray Kaplan, Glen Zorn, Joe Kovara:

Planning and Implementing Kerberos for Large Distributed Systems: Part 2. 36-44 - Robert E. Smith:

Proactive Solutions for Multinetwork Security. 47-55 - Martha Stansell-Gamm:

Responding to Computer Crime: A Security Practitioner's Guide. 56-64 - Ralph Spencer Poore

:
Reference Monitor Technology: Watching Your Every Keystroke. 65-74 - Donn B. Parker:

A Guide to Selecting and Implementing Security Controls. 75-86
Volume 3, Number 3, 1994
- Donn B. Parker:

From the Editor. 3-4
- Harry B. DeMaio:

Information Security: Behind the Telecommuting Power Curve. 5-10
- Wayne Madsen:

International ITSEC Standards: INTEL Isn't Inside. 11-15
- Donn B. Parker:

Update on Cryptography: Who Will Keep the Keys? 16-22
- Ralph Spencer Poore

:
Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places. 23-26
- Michael I. Sobol:

Data Encryption. 27-31
- Robert R. Moeller:

Communications Security, LAN Security, and Viruses. 32-36
- Dan G. Erwin:

The Thirty-Minute Risk Analysis. 37-44 - Joseph Piazza:

A Multilevel Strategy for Combatting Viruses. 45-52 - Sandra M. Lambert:

Exploiting the Power of Message Authentication Codes. 53-63 - James E. Molini:

The New Frontier: Clieht/Server and Agent Technology. 64-71
Volume 3, Number 4, 1995
- Donn B. Parker:

From the Editor. 3-4
- Harry B. DeMaio:

Information Protection and Business Process Reengineering. 5-10
- Wayne Madsen:

Information Police on the Internet. 11-15
- Donn B. Parker:

Security Accountability in Job Performance. 16-20
- Gary Benesko, Philip Teplitzky:

EDI Integrity Controls. 21-25
- Michael I. Sobol:

Products Used to Secure Networked Macintosh Computers. 27-29
- William Hugh Murray:

Modern Cryptography. 30-33
- Ed Sawicki:

Securing NetWare Against Trojan Horse Attacks. 34-41 - William M. Hancock:

Dial-Up Modem Protection Schemes. 42-51 - Kirby G. Dickson:

Information Anarchy and the Control of Cryptography. 52-58 - Mary Ann Davidson:

Security in an Oracle Data Base Environment. 59-68

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














