Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             76 results found
no title author magazine year volume issue page(s) type
1 Aftershocks for Silicon Valley 1988
7 2 p. 213-
1 p.
article
2 Anatomy of a virus attack Highland, Harold Joseph
1988
7 2 p. 145-150
6 p.
article
3 An overview of 18 virus protection products Highland, Harold Joseph
1988
7 2 p. 157-161
5 p.
article
4 ANSI, Feds address DMBS security 1988
7 2 p. 220-
1 p.
article
5 Apollo skirts site license issue 1988
7 2 p. 217-
1 p.
article
6 Are we vulnerable to a virus attack? A report from Sweden Fåk, Viiveke
1988
7 2 p. 151-155
5 p.
article
7 A security checklist for upper management 1988
7 2 p. 219-
1 p.
article
8 Battling Mediocrity 1988
7 2 p. 217-
1 p.
article
9 Buyers turning toward software escrow plans 1988
7 2 p. 215-216
2 p.
article
10 Calendar 1988
7 2 p. 224-
1 p.
article
11 Coalition to combat software piracy 1988
7 2 p. 219-
1 p.
article
12 Computer security shift is approved by Senate 1988
7 2 p. 213-214
2 p.
article
13 Computer user surveillance 1988
7 2 p. 215-
1 p.
article
14 Computer viruses—A secret threat 1988
7 2 p. 215-
1 p.
article
15 Conference focuses on reduction of software risks 1988
7 2 p. 216-
1 p.
article
16 Crash course: Lessons in preventing computer downtime 1988
7 2 p. 217-
1 p.
article
17 Data encryption is key to safe file transmission 1988
7 2 p. 221-
1 p.
article
18 Data security provides the key to lock out intruders 1988
7 2 p. 216-
1 p.
article
19 Dickerson center of tug-of-war 1988
7 2 p. 213-
1 p.
article
20 Discussing security with top management Bound, William A.J.
1988
7 2 p. 129-130
2 p.
article
21 Evaluating signature verification systems is tricky 1988
7 2 p. 221-222
2 p.
article
22 Expert sees national security risks in BASIS net 1988
7 2 p. 221-
1 p.
article
23 Faulty tolerance adds security to critical on-line transactions 1988
7 2 p. 216-
1 p.
article
24 From the editor Highland, Harold Joseph
1988
7 2 p. 114-
1 p.
article
25 Fuss over bottom line could foil disaster recovery 1988
7 2 p. 220-
1 p.
article
26 Guarding your data 1988
7 2 p. 219-
1 p.
article
27 Hardware protection of communications ports and lines 1988
7 2 p. 219-
1 p.
article
28 Hardware, software security devices protect PCs and inside information 1988
7 2 p. 218-
1 p.
article
29 Hold that Lawsuit 1988
7 2 p. 213-
1 p.
article
30 Hong Kong focus 1988
7 2 p. 214-
1 p.
article
31 Horatius 1988
7 2 p. 215-
1 p.
article
32 How to combat a computer virus Highland, Harold Joseph
1988
7 2 p. 157-163
7 p.
article
33 How to secure a local area network 1988
7 2 p. 216-
1 p.
article
34 IFIP technical committee 11 1988
7 2 p. 205-206
2 p.
article
35 Insurance and computers: The technology gap 1988
7 2 p. 215-
1 p.
article
36 International board of referees 1988
7 2 p. 165-166
2 p.
article
37 Is site licensing a dead issue? 1988
7 2 p. 218-
1 p.
article
38 Legal protection for computer software 1988
7 2 p. 213-
1 p.
article
39 Letters to the editor 1988
7 2 p. 115-116
2 p.
article
40 Loophole gives hackers access to DEC machines 1988
7 2 p. 221-
1 p.
article
41 Make the tigers hunt for you Herschberg, I.S.
1988
7 2 p. 197-203
7 p.
article
42 Manage/38 1988
7 2 p. 215-
1 p.
article
43 Microsoft, Borland Settle Dickerson Case 1988
7 2 p. 213-
1 p.
article
44 MIS assumes a shirt-sleeves approach to protecting power 1988
7 2 p. 218-
1 p.
article
45 Most systems held fast while storm clouds grew on Wall St 1988
7 2 p. 218-
1 p.
article
46 NASD power dip could recur 1988
7 2 p. 220-
1 p.
article
47 NBS and NSA stand on different sides of security 1988
7 2 p. 221-
1 p.
article
48 Net failures growing concern in workplace 1988
7 2 p. 217-
1 p.
article
49 New wave of LAN security products hailed by users 1988
7 2 p. 217-
1 p.
article
50 No easy way through data- security maze, consultants say 1988
7 2 p. 218-
1 p.
article
51 NSA, NBS coming together on computer security 1988
7 2 p. 217-
1 p.
article
52 On the implications of computer viruses and methods of defense Cohen, Fred
1988
7 2 p. 167-184
18 p.
article
53 Organizational structuring of the computer security function Straub Jr., Detmar W.
1988
7 2 p. 185-195
11 p.
article
54 PC-mainframe ties hard to guard 1988
7 2 p. 216-217
2 p.
article
55 Personnel: The other half of data security Zajac Jr., Bernard P.
1988
7 2 p. 131-132
2 p.
article
56 Pitfalls in measuring MIS performance Bologna, G.J.
1988
7 2 p. 137-138
2 p.
article
57 Policies for secure personal data 1988
7 2 p. 219-
1 p.
article
58 Radio frequency interfaces—Myths, realities and a practical approach 1988
7 2 p. 214-
1 p.
article
59 Random bits & bytes 1988
7 2 p. 117-127
11 p.
article
60 Remote identification and authentication of computer resource users 1988
7 2 p. 214-
1 p.
article
61 Security considerations for minicomputer systems acquisitions 1988
7 2 p. 219-
1 p.
article
62 Security in the VM environment 1988
7 2 p. 214-
1 p.
article
63 Security planning for EFT network systems 1988
7 2 p. 214-215
2 p.
article
64 Security systems: Getting management to shell out 1988
7 2 p. 220-221
2 p.
article
65 Senate approves funds for DEA tempest equipment 1988
7 2 p. 216-
1 p.
article
66 Shrink-wrap licensing 1988
7 2 p. 214-
1 p.
article
67 The application of epidemiology to computer viruses Murray, W.H.
1988
7 2 p. 139-145
7 p.
article
68 The corporate view 1988
7 2 p. 220-
1 p.
article
69 The structure of system/88, a fault-tolerant computer 1988
7 2 p. 218-
1 p.
article
70 To catch a thief: Lessons in systems security 1988
7 2 p. 220-
1 p.
article
71 Understanding the use of passwords Menkus, Belden
1988
7 2 p. 132-136
5 p.
article
72 Uninterruptible power supplies 1988
7 2 p. 218-219
2 p.
article
73 Virus defense alert 1988
7 2 p. 156-
1 p.
article
74 Wanted: Full-time contingency planners 1988
7 2 p. 220-
1 p.
article
75 What others are saying 1988
7 2 p. 210-212
3 p.
article
76 World-wide reports on developments in computer security: Part II 1988
7 2 p. 207-209
3 p.
article
                             76 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands