Computers & security
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
Table of contents
- 2
-
Editorial Board| 1988
- 2
-
From the editor| 1988
- 3
-
Case history of a virus attackDr. Highland, Harold Joseph et al. | 1988
- 5
-
Encryption, attacks and ethicsDr. Highland, Harold Joseph et al. | 1988
- 6
-
How to protect a microcomputer systemDr. Highland, Harold Joseph et al. | 1988
- 7
-
Chernobyl computer communicationsDr. Highland, Harold Joseph et al. | 1988
- 9
-
Electromagnetic interferenceDr. Highland, Harold Joseph et al. | 1988
- 10
-
For your informationDr. Highland, Harold Joseph et al. | 1988
- 10
-
IFIP/Sec '88Dr. Highland, Harold Joseph et al. | 1988
- 13
-
Product reviewsDr. Highland, Harold Joseph et al. | 1988
- 19
-
Another perspective on sensitive but unclassified dataCourtney, Robert H. Jr. et al. | 1988
- 25
-
How secure are fiber optics communications?Dr. Highland, Harold Joseph et al. | 1988
- 27
-
Secretdisk II— transparent automatic encryptionDr. Highland, Harold Joseph et al. | 1988
- 35
-
Dial-up communication lines: Can they be secured?Zajac, Bernard P. Jr. et al. | 1988
- 37
-
Program aids for office automation securityDr. Highland,, Harold Joseph et al. | 1988
- 45
-
International board of referees| 1988
- 47
-
Getting started in data processing disaster recoveryMenkus, Belden et al. | 1988
- 53
-
Network security and access controlsAmsel,, Ellen et al. | 1988
- 59
-
Protecting statistical databases against retrieval of private informationAhituv, Niv / Lapid, Yeheskel / Neumann, Seev et al. | 1988
- 65
-
Message authentication and encryption combinedChristoffersson, Per et al. | 1988
- 73
-
Element-level classification with A1 assuranceLunt, Teresa F. / Denning, Dorothy E. / Schell, Roger R. et al. | 1988
- 83
-
A public-key cryptosystem based on language theorySalomaa, Arto et al. | 1988
- 89
-
New locks and keys for electronic information| 1988
- 95
-
IFIP technical committee 11| 1988
- 97
-
World-wide reports on developments in computer security| 1988
- 101
-
Fighting software piracy| 1988
- 101
-
Anatomy of a disaster| 1988
- 101
-
Apple urges separate copyright registration of screen displays| 1988
- 101
-
Guidelines or standards! part one| 1988
- 101
-
Justice Ordered to pay software licensing fees| 1988
- 102
-
Computer crime—What to do before it happens| 1988
- 102
-
Lotus promises new releases, no protection| 1988
- 102
-
German computer hobbyists rifle NASA's files| 1988
- 102
-
MIS computer security slacking| 1988
- 102
-
NASA says classified data not breached| 1988
- 102
-
1-2-3 to go unprotected| 1988
- 102
-
HK raid uncovers autodesk pirates| 1988
- 103
-
Has EDP audit progressed in the last 15 years?Weber, Ron et al. | 1988
- 103
-
Public policy and internal privacy codes| 1988
- 103
-
Report says computers spy on 7 million workers in US| 1988
- 103
-
“Never mind!” businesses cool off on site license issue| 1988
- 103
-
Processing encrypted data| 1988
- 103
-
Tactical planning for data security management| 1988
- 103
-
When the password is a passkeyLewis, Peter H. et al. | 1988
- 104
-
North didn't understand delete functionMcDonald, Evelyn C. et al. | 1988
- 104
-
Disaster recovery neededHunter, Philip et al. | 1988
- 104
-
IBM slow to remedy leaky DB2 securityBozman, Jean S. et al. | 1988
- 104
-
Users see flaws in audit trails, access authorityBozman, Jean S. et al. | 1988
- 104
-
Secure information is accurate informationHargrove, Robert et al. | 1988
- 104
-
The automated cryptananysis of polyalphabetic ciphersCarroll, John M. / Robbins, Lynda et al. | 1988
- 105
-
Data errors hurt state department systemGrimm, Vanessa Jo et al. | 1988
- 105
-
Computer trouble makes British skies unfriendlyHunter, Philip et al. | 1988
- 105
-
Analysis of the encryption algorithm used in the wordperfect word processing programBennett, John et al. | 1988
- 105
-
LA sites rockedJones, Stephen / Editors, Senior et al. | 1988
- 105
-
OSI security system revealedHorwitt, Elisabeth et al. | 1988
- 105
-
IBM users told data files could have legal pitfallsGoff, Leslie et al. | 1988
- 105
-
New risk management lab will tackle security needsMunro, Neil et al. | 1988
- 106
-
LANS introduce new security issuesChandler, Harriette L. et al. | 1988
- 106
-
Fire and humidity: Data safes protect against bothSopko, Sandra et al. | 1988
- 106
-
Security and office automationWong, Ken et al. | 1988
- 106
-
Encryption standard to get reprieveBetts, Mitch et al. | 1988
- 106
-
Hospital's medical data held in strict security| 1988
- 106
-
Security issues concern NSA, vendors| 1988
- 107
-
Development of confidence limits by pivotal functions for estimating software reliability| 1988
- 107
-
Fault tolerant computers and multiprocessing. January 1985–June 1987| 1988
- 107
-
In London, stocks up and computers downHunter, Philip et al. | 1988
- 107
-
After the street's unforgettable week all info systems are (mostly) goCrockett, Barton / Medford, Cassimir J. et al. | 1988
- 107
-
Today's computer crime: The threat from withinben-Aaron, Diana / Green, Lee et al. | 1988
- 107
-
In Japan, MIS weathers the storm easilyKo, Dorothy et al. | 1988
- 108
-
Software still is arriving with those annoying bugsPerry, William E. et al. | 1988
- 108
-
Unclassified security calls for a ‘friendly’ approachMiles, J.B. et al. | 1988
- 108
-
Public-private partners work on secure protocolsMiles, J.B. et al. | 1988
- 108
-
Expert tells DoD it needs training, not more tempestMunro, Neil et al. | 1988
- 108
-
Addresses of publications| 1988
- 111
-
Calendar| 1988