no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1983 |
2 |
1 |
p. 88-96 9 p. |
article |
2 |
Advances in computer system security
|
H, HJ |
|
1983 |
2 |
1 |
p. 84- 1 p. |
article |
3 |
Calendar
|
|
|
1983 |
2 |
1 |
p. 97-98 2 p. |
article |
4 |
CBEMA privacy and security bibliography (October 1982)
|
H, HJ |
|
1983 |
2 |
1 |
p. 83- 1 p. |
article |
5 |
Codes, ciphers and computers: An introduction to information security
|
H, HJ |
|
1983 |
2 |
1 |
p. 83-84 2 p. |
article |
6 |
Computer crime and its prevention
|
Goldstein, Bruce |
|
1983 |
2 |
1 |
p. 63-66 4 p. |
article |
7 |
Computer security: Observations on the state of the technology
|
Murray, William H. |
|
1983 |
2 |
1 |
p. 16-23 8 p. |
article |
8 |
Controlling cryptographic publication
|
Weingarten, F. |
|
1983 |
2 |
1 |
p. 41-48 8 p. |
article |
9 |
Data communications controls
|
Cerullo, Michael J. |
|
1983 |
2 |
1 |
p. 67-72 6 p. |
article |
10 |
Editorial
|
Highland, Harold Joseph |
|
1983 |
2 |
1 |
p. 1-2 2 p. |
article |
11 |
Editorial Board
|
|
|
1983 |
2 |
1 |
p. IFC- 1 p. |
article |
12 |
Effective information system security with password controls
|
Wood, Charles Cresson |
|
1983 |
2 |
1 |
p. 5-10 6 p. |
article |
13 |
EFTS impact on computer security
|
Guynes, Steve |
|
1983 |
2 |
1 |
p. 73-77 5 p. |
article |
14 |
Methodology for security analysis of data-processing systems
|
Caroll, John M. |
|
1983 |
2 |
1 |
p. 24-34 11 p. |
article |
15 |
Notes on terrorism and data processing
|
Menkus, Belden |
|
1983 |
2 |
1 |
p. 11-15 5 p. |
article |
16 |
Securing the distributed word processing network
|
Callaghan, David R. |
|
1983 |
2 |
1 |
p. 78-81 4 p. |
article |
17 |
The hut six story: Breaking the Enigma codes
|
H, HJ |
|
1983 |
2 |
1 |
p. 82-83 2 p. |
article |
18 |
The Office of Technology Assessment reports
|
|
|
1983 |
2 |
1 |
p. 85-87 3 p. |
article |
19 |
Three new members of the International Board of Editors
|
|
|
1983 |
2 |
1 |
p. 3-4 2 p. |
article |
20 |
Towards a new approach to secure database design
|
Bussolati, U. |
|
1983 |
2 |
1 |
p. 49-62 14 p. |
article |
21 |
Tutorial: The security of data in networks
|
H, HJ |
|
1983 |
2 |
1 |
p. 84- 1 p. |
article |
22 |
Unique approach to security evaluation
|
Backwith, Nigel |
|
1983 |
2 |
1 |
p. 35-40 6 p. |
article |