default search action
Information Systems Security, Volume 4
Volume 4, Number 1, 1995
- Donn B. Parker:
From the Editor. 3
- Harry B. DeMaio:
A Wish List of Security and Continuity Technologies. 5-10
- Wayne Madsen:
Reinventing Federal Security Policy: A Failed Effort. 11-15
- Donn B. Parker:
Computer Loss Experience and Predictions. 16-22
- Ralph Spencer Poore:
Business Use of Cryptography. 23-26
- Michael I. Sobol:
Products for Power Protection. 27-31
- Robert R. Moeller:
Securing the NET (and Other Issues). 32-36
- Douglas G. Conorich:
Trusted UNIX Host Security. 37-43 - Barry D. Lewis:
Reviewing VTAM and NetView Security Controls. 44-55 - Christopher Zoladz:
Creating a Secure EDI Environment. 56-65 - Bruce Murphy:
Security of Wireless Local Area Networks. 66-75
Volume 4, Number 2, 1995
- Donn B. Parker:
From the Editor. 3-6
- Harry B. DeMaio:
Open Systems Security and the Art of Random Juggling. 7-12
- Wayne Madsen:
Globalization of Services: GATT, NAFTA, and the Threat to Information Security. 13-18
- Donn B. Parker:
Possession as an Element of Information Security. 19-26
- Dennis A. Adams, Shafique Pappa:
Issues in Client/Server Security. 27-41 - Peter D. Goldis:
Single Sign-on: Problems and Solutions. 42-54 - Karen Nelson:
Combating Viruses on Microcomputers and LANs. 55-62 - Ed Norris:
Protecting Against Hacker Attacks. 63-71
Volume 4, Number 3, 1995
- Donn B. Parker:
From the Editor. 3
- Harry B. DeMaio:
How Companies Are Approaching Open Systems SecurityA Composite View. 5-11
- Wayne Madsen:
Information Warfare: A New Threat to Information Security and Integrity. 12-15
- Donn B. Parker:
Defining Automated Crime. 16-21
- Ralph Spencer Poore:
Closed Serve at the Open Net. 22-26
- Michael I. Sobol:
Disaster Recovery Products and Services. 27-31
- Robert R. Moeller:
Security in Cyberspace (and Some Legal Issues). 32-37
- Ralph P. Massaro:
Single Sign-on and Security in a Client/Server Environment. 38-45 - Glenn Hout:
Harnessing Mainframe Strengths for an Enterprisewide Backup Solution. 46-51 - Eugene H. Spafford:
UNIX and Security: The Influences of History. 52-60 - Edward H. Freeman:
When Technology and Privacy Collide. 62-66 - Phillip Q. Maier:
Protecting the Portable Computing Environment. 67-74
Volume 4, Number 4, 1996
- Harry B. DeMaio:
OSF/DCE Security - Its Worth Exploring. 3-7
- Wayne Madsen:
Digital Cash: Fact or Fancy. 8-13
- Donn B. Parker:
Security as the Target of Criminals. 14-20
- Philip Teplitzky:
Security in Multidimensional Data Bases. 21-23
- Michael I. Sobol:
NetWare Security Products. 24-28
- James E. Molini:
The New Frontier: Client/Server and Agent Technology - Part 2. 29-36 - John P. Ceraolo:
Penetration Testing Through Social Engineering. 37-48 - Ron Hale:
End-User Computing Security Guidelines. 49-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.