default search action
Information Systems Security, Volume 3
Volume 3, Number 1, 1994
- Donn B. Parker:
From the Editor. 3-4
- Harry B. DeMaio:
Information Protection Standards in the 1990s: Part 2. 5-10
- Wayne Madsen:
Protecting Business Secrets in an EDI/CALS Environment. 11-16
- Donn B. Parker:
Demonstrating the Elements of Information Security with Loss Scenarios. 17-22
- Gordon Fielding:
Electronic Eavesdropping: Solutions in Search of a Problem. 23-24
- Michael I. Sobol:
Products for Media Backup and Recovery. 25-30
- Robert R. Moeller:
Two New Books on UNIX and Data Base Security. 31-34
- Ray Kaplan, Joe Kovara, Glen Zorn:
Planning and Implementing Kerberos for Large Distributed Systems Part 1. 35-44 - Larry Runge:
Security and Data Integrity in a Client-Server Environment. 45-56 - Addison Fischer:
Public Key Cryptography in Action. 57-70 - Micki Krause:
Writing a Communications Security Policy. 71-81
Volume 3, Number 2, 1994
- Donn B. Parker:
From the Editor. 3
- Harry B. DeMaio:
Groupware - Hazardous to Your Health? 5-9
- Wayne Madsen:
Net-Jacking on the National Information Highway. 10-14
- Gary Benesko, Philip Teplitzky:
Security and Controls for EDI. 15-19
- Geoffrey W. Turner:
Cryptography: Beyond Computer Crime. 20-23
- Michael I. Sobol:
Anti-Virus Software. 24-29
- William Hugh Murray:
Five Views of the Common Body of Knowledge. 30-35
- Ray Kaplan, Glen Zorn, Joe Kovara:
Planning and Implementing Kerberos for Large Distributed Systems: Part 2. 36-44 - Robert E. Smith:
Proactive Solutions for Multinetwork Security. 47-55 - Martha Stansell-Gamm:
Responding to Computer Crime: A Security Practitioner's Guide. 56-64 - Ralph Spencer Poore:
Reference Monitor Technology: Watching Your Every Keystroke. 65-74 - Donn B. Parker:
A Guide to Selecting and Implementing Security Controls. 75-86
Volume 3, Number 3, 1994
- Donn B. Parker:
From the Editor. 3-4
- Harry B. DeMaio:
Information Security: Behind the Telecommuting Power Curve. 5-10
- Wayne Madsen:
International ITSEC Standards: INTEL Isn't Inside. 11-15
- Donn B. Parker:
Update on Cryptography: Who Will Keep the Keys? 16-22
- Ralph Spencer Poore:
Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places. 23-26
- Michael I. Sobol:
Data Encryption. 27-31
- Robert R. Moeller:
Communications Security, LAN Security, and Viruses. 32-36
- Dan G. Erwin:
The Thirty-Minute Risk Analysis. 37-44 - Joseph Piazza:
A Multilevel Strategy for Combatting Viruses. 45-52 - Sandra M. Lambert:
Exploiting the Power of Message Authentication Codes. 53-63 - James E. Molini:
The New Frontier: Clieht/Server and Agent Technology. 64-71
Volume 3, Number 4, 1995
- Donn B. Parker:
From the Editor. 3-4
- Harry B. DeMaio:
Information Protection and Business Process Reengineering. 5-10
- Wayne Madsen:
Information Police on the Internet. 11-15
- Donn B. Parker:
Security Accountability in Job Performance. 16-20
- Gary Benesko, Philip Teplitzky:
EDI Integrity Controls. 21-25
- Michael I. Sobol:
Products Used to Secure Networked Macintosh Computers. 27-29
- William Hugh Murray:
Modern Cryptography. 30-33
- Ed Sawicki:
Securing NetWare Against Trojan Horse Attacks. 34-41 - William M. Hancock:
Dial-Up Modem Protection Schemes. 42-51 - Kirby G. Dickson:
Information Anarchy and the Control of Cryptography. 52-58 - Mary Ann Davidson:
Security in an Oracle Data Base Environment. 59-68
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.