no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Aftershocks for Silicon Valley
|
|
|
1988 |
7 |
2 |
p. 213- 1 p. |
article |
2 |
Anatomy of a virus attack
|
Highland, Harold Joseph |
|
1988 |
7 |
2 |
p. 145-150 6 p. |
article |
3 |
An overview of 18 virus protection products
|
Highland, Harold Joseph |
|
1988 |
7 |
2 |
p. 157-161 5 p. |
article |
4 |
ANSI, Feds address DMBS security
|
|
|
1988 |
7 |
2 |
p. 220- 1 p. |
article |
5 |
Apollo skirts site license issue
|
|
|
1988 |
7 |
2 |
p. 217- 1 p. |
article |
6 |
Are we vulnerable to a virus attack? A report from Sweden
|
Fåk, Viiveke |
|
1988 |
7 |
2 |
p. 151-155 5 p. |
article |
7 |
A security checklist for upper management
|
|
|
1988 |
7 |
2 |
p. 219- 1 p. |
article |
8 |
Battling Mediocrity
|
|
|
1988 |
7 |
2 |
p. 217- 1 p. |
article |
9 |
Buyers turning toward software escrow plans
|
|
|
1988 |
7 |
2 |
p. 215-216 2 p. |
article |
10 |
Calendar
|
|
|
1988 |
7 |
2 |
p. 224- 1 p. |
article |
11 |
Coalition to combat software piracy
|
|
|
1988 |
7 |
2 |
p. 219- 1 p. |
article |
12 |
Computer security shift is approved by Senate
|
|
|
1988 |
7 |
2 |
p. 213-214 2 p. |
article |
13 |
Computer user surveillance
|
|
|
1988 |
7 |
2 |
p. 215- 1 p. |
article |
14 |
Computer viruses—A secret threat
|
|
|
1988 |
7 |
2 |
p. 215- 1 p. |
article |
15 |
Conference focuses on reduction of software risks
|
|
|
1988 |
7 |
2 |
p. 216- 1 p. |
article |
16 |
Crash course: Lessons in preventing computer downtime
|
|
|
1988 |
7 |
2 |
p. 217- 1 p. |
article |
17 |
Data encryption is key to safe file transmission
|
|
|
1988 |
7 |
2 |
p. 221- 1 p. |
article |
18 |
Data security provides the key to lock out intruders
|
|
|
1988 |
7 |
2 |
p. 216- 1 p. |
article |
19 |
Dickerson center of tug-of-war
|
|
|
1988 |
7 |
2 |
p. 213- 1 p. |
article |
20 |
Discussing security with top management
|
Bound, William A.J. |
|
1988 |
7 |
2 |
p. 129-130 2 p. |
article |
21 |
Evaluating signature verification systems is tricky
|
|
|
1988 |
7 |
2 |
p. 221-222 2 p. |
article |
22 |
Expert sees national security risks in BASIS net
|
|
|
1988 |
7 |
2 |
p. 221- 1 p. |
article |
23 |
Faulty tolerance adds security to critical on-line transactions
|
|
|
1988 |
7 |
2 |
p. 216- 1 p. |
article |
24 |
From the editor
|
Highland, Harold Joseph |
|
1988 |
7 |
2 |
p. 114- 1 p. |
article |
25 |
Fuss over bottom line could foil disaster recovery
|
|
|
1988 |
7 |
2 |
p. 220- 1 p. |
article |
26 |
Guarding your data
|
|
|
1988 |
7 |
2 |
p. 219- 1 p. |
article |
27 |
Hardware protection of communications ports and lines
|
|
|
1988 |
7 |
2 |
p. 219- 1 p. |
article |
28 |
Hardware, software security devices protect PCs and inside information
|
|
|
1988 |
7 |
2 |
p. 218- 1 p. |
article |
29 |
Hold that Lawsuit
|
|
|
1988 |
7 |
2 |
p. 213- 1 p. |
article |
30 |
Hong Kong focus
|
|
|
1988 |
7 |
2 |
p. 214- 1 p. |
article |
31 |
Horatius
|
|
|
1988 |
7 |
2 |
p. 215- 1 p. |
article |
32 |
How to combat a computer virus
|
Highland, Harold Joseph |
|
1988 |
7 |
2 |
p. 157-163 7 p. |
article |
33 |
How to secure a local area network
|
|
|
1988 |
7 |
2 |
p. 216- 1 p. |
article |
34 |
IFIP technical committee 11
|
|
|
1988 |
7 |
2 |
p. 205-206 2 p. |
article |
35 |
Insurance and computers: The technology gap
|
|
|
1988 |
7 |
2 |
p. 215- 1 p. |
article |
36 |
International board of referees
|
|
|
1988 |
7 |
2 |
p. 165-166 2 p. |
article |
37 |
Is site licensing a dead issue?
|
|
|
1988 |
7 |
2 |
p. 218- 1 p. |
article |
38 |
Legal protection for computer software
|
|
|
1988 |
7 |
2 |
p. 213- 1 p. |
article |
39 |
Letters to the editor
|
|
|
1988 |
7 |
2 |
p. 115-116 2 p. |
article |
40 |
Loophole gives hackers access to DEC machines
|
|
|
1988 |
7 |
2 |
p. 221- 1 p. |
article |
41 |
Make the tigers hunt for you
|
Herschberg, I.S. |
|
1988 |
7 |
2 |
p. 197-203 7 p. |
article |
42 |
Manage/38
|
|
|
1988 |
7 |
2 |
p. 215- 1 p. |
article |
43 |
Microsoft, Borland Settle Dickerson Case
|
|
|
1988 |
7 |
2 |
p. 213- 1 p. |
article |
44 |
MIS assumes a shirt-sleeves approach to protecting power
|
|
|
1988 |
7 |
2 |
p. 218- 1 p. |
article |
45 |
Most systems held fast while storm clouds grew on Wall St
|
|
|
1988 |
7 |
2 |
p. 218- 1 p. |
article |
46 |
NASD power dip could recur
|
|
|
1988 |
7 |
2 |
p. 220- 1 p. |
article |
47 |
NBS and NSA stand on different sides of security
|
|
|
1988 |
7 |
2 |
p. 221- 1 p. |
article |
48 |
Net failures growing concern in workplace
|
|
|
1988 |
7 |
2 |
p. 217- 1 p. |
article |
49 |
New wave of LAN security products hailed by users
|
|
|
1988 |
7 |
2 |
p. 217- 1 p. |
article |
50 |
No easy way through data- security maze, consultants say
|
|
|
1988 |
7 |
2 |
p. 218- 1 p. |
article |
51 |
NSA, NBS coming together on computer security
|
|
|
1988 |
7 |
2 |
p. 217- 1 p. |
article |
52 |
On the implications of computer viruses and methods of defense
|
Cohen, Fred |
|
1988 |
7 |
2 |
p. 167-184 18 p. |
article |
53 |
Organizational structuring of the computer security function
|
Straub Jr., Detmar W. |
|
1988 |
7 |
2 |
p. 185-195 11 p. |
article |
54 |
PC-mainframe ties hard to guard
|
|
|
1988 |
7 |
2 |
p. 216-217 2 p. |
article |
55 |
Personnel: The other half of data security
|
Zajac Jr., Bernard P. |
|
1988 |
7 |
2 |
p. 131-132 2 p. |
article |
56 |
Pitfalls in measuring MIS performance
|
Bologna, G.J. |
|
1988 |
7 |
2 |
p. 137-138 2 p. |
article |
57 |
Policies for secure personal data
|
|
|
1988 |
7 |
2 |
p. 219- 1 p. |
article |
58 |
Radio frequency interfaces—Myths, realities and a practical approach
|
|
|
1988 |
7 |
2 |
p. 214- 1 p. |
article |
59 |
Random bits & bytes
|
|
|
1988 |
7 |
2 |
p. 117-127 11 p. |
article |
60 |
Remote identification and authentication of computer resource users
|
|
|
1988 |
7 |
2 |
p. 214- 1 p. |
article |
61 |
Security considerations for minicomputer systems acquisitions
|
|
|
1988 |
7 |
2 |
p. 219- 1 p. |
article |
62 |
Security in the VM environment
|
|
|
1988 |
7 |
2 |
p. 214- 1 p. |
article |
63 |
Security planning for EFT network systems
|
|
|
1988 |
7 |
2 |
p. 214-215 2 p. |
article |
64 |
Security systems: Getting management to shell out
|
|
|
1988 |
7 |
2 |
p. 220-221 2 p. |
article |
65 |
Senate approves funds for DEA tempest equipment
|
|
|
1988 |
7 |
2 |
p. 216- 1 p. |
article |
66 |
Shrink-wrap licensing
|
|
|
1988 |
7 |
2 |
p. 214- 1 p. |
article |
67 |
The application of epidemiology to computer viruses
|
Murray, W.H. |
|
1988 |
7 |
2 |
p. 139-145 7 p. |
article |
68 |
The corporate view
|
|
|
1988 |
7 |
2 |
p. 220- 1 p. |
article |
69 |
The structure of system/88, a fault-tolerant computer
|
|
|
1988 |
7 |
2 |
p. 218- 1 p. |
article |
70 |
To catch a thief: Lessons in systems security
|
|
|
1988 |
7 |
2 |
p. 220- 1 p. |
article |
71 |
Understanding the use of passwords
|
Menkus, Belden |
|
1988 |
7 |
2 |
p. 132-136 5 p. |
article |
72 |
Uninterruptible power supplies
|
|
|
1988 |
7 |
2 |
p. 218-219 2 p. |
article |
73 |
Virus defense alert
|
|
|
1988 |
7 |
2 |
p. 156- 1 p. |
article |
74 |
Wanted: Full-time contingency planners
|
|
|
1988 |
7 |
2 |
p. 220- 1 p. |
article |
75 |
What others are saying
|
|
|
1988 |
7 |
2 |
p. 210-212 3 p. |
article |
76 |
World-wide reports on developments in computer security: Part II
|
|
|
1988 |
7 |
2 |
p. 207-209 3 p. |
article |