


default search action
Information Systems Security, Volume 4
Volume 4, Number 1, 1995
- Donn B. Parker:

From the Editor. 3
- Harry B. DeMaio:

A Wish List of Security and Continuity Technologies. 5-10
- Wayne Madsen:

Reinventing Federal Security Policy: A Failed Effort. 11-15
- Donn B. Parker:

Computer Loss Experience and Predictions. 16-22
- Ralph Spencer Poore

:
Business Use of Cryptography. 23-26
- Michael I. Sobol:

Products for Power Protection. 27-31
- Robert R. Moeller:

Securing the NET (and Other Issues). 32-36
- Douglas G. Conorich:

Trusted UNIX Host Security. 37-43 - Barry D. Lewis:

Reviewing VTAM and NetView Security Controls. 44-55 - Christopher Zoladz:

Creating a Secure EDI Environment. 56-65 - Bruce Murphy:

Security of Wireless Local Area Networks. 66-75
Volume 4, Number 2, 1995
- Donn B. Parker:

From the Editor. 3-6
- Harry B. DeMaio:

Open Systems Security and the Art of Random Juggling. 7-12
- Wayne Madsen:

Globalization of Services: GATT, NAFTA, and the Threat to Information Security. 13-18
- Donn B. Parker:

Possession as an Element of Information Security. 19-26
- Dennis A. Adams, Shafique Pappa:

Issues in Client/Server Security. 27-41 - Peter D. Goldis:

Single Sign-on: Problems and Solutions. 42-54 - Karen Nelson:

Combating Viruses on Microcomputers and LANs. 55-62 - Ed Norris:

Protecting Against Hacker Attacks. 63-71
Volume 4, Number 3, 1995
- Donn B. Parker:

From the Editor. 3
- Harry B. DeMaio:

How Companies Are Approaching Open Systems SecurityA Composite View. 5-11
- Wayne Madsen:

Information Warfare: A New Threat to Information Security and Integrity. 12-15
- Donn B. Parker:

Defining Automated Crime. 16-21
- Ralph Spencer Poore

:
Closed Serve at the Open Net. 22-26
- Michael I. Sobol:

Disaster Recovery Products and Services. 27-31
- Robert R. Moeller:

Security in Cyberspace (and Some Legal Issues). 32-37
- Ralph P. Massaro:

Single Sign-on and Security in a Client/Server Environment. 38-45 - Glenn Hout:

Harnessing Mainframe Strengths for an Enterprisewide Backup Solution. 46-51 - Eugene H. Spafford:

UNIX and Security: The Influences of History. 52-60 - Edward H. Freeman:

When Technology and Privacy Collide. 62-66 - Phillip Q. Maier:

Protecting the Portable Computing Environment. 67-74
Volume 4, Number 4, 1996
- Harry B. DeMaio:

OSF/DCE Security - Its Worth Exploring. 3-7
- Wayne Madsen:

Digital Cash: Fact or Fancy. 8-13
- Donn B. Parker:

Security as the Target of Criminals. 14-20
- Philip Teplitzky:

Security in Multidimensional Data Bases. 21-23
- Michael I. Sobol:

NetWare Security Products. 24-28
- James E. Molini:

The New Frontier: Client/Server and Agent Technology - Part 2. 29-36 - John P. Ceraolo:

Penetration Testing Through Social Engineering. 37-48 - Ron Hale:

End-User Computing Security Guidelines. 49-64

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














