Information security policies made easy (English)
National licence
Charles Cresson Wood, Baseline Software, Sausalito, CA 94966-1219, USA; 1994, 262 pages, $495, ISBN: 1-881585-01-8.
- New search for: Zajac, Bernard P. Jr.
- New search for: Zajac, Bernard P. Jr.
In:
Computers and Security
;
13
, 3
;
218-219
;
1994
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Information security policies made easy
-
Subtitle:Charles Cresson Wood, Baseline Software, Sausalito, CA 94966-1219, USA; 1994, 262 pages, $495, ISBN: 1-881585-01-8.
-
Contributors:Zajac, Bernard P. Jr. ( author )
-
Published in:Computers and Security ; 13, 3 ; 218-219
-
Publisher:
-
Publication date:1994-01-01
-
Size:2 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 13, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 190
-
From the editor| 1994
- 192
-
Random bits & bytesFICS Highland,, HaroldJoseph et al. | 1994
- 192
-
What is Internet?| 1994
- 192
-
The Internet and Computer Security| 1994
- 192
-
How Secure is Data Over the Internet?| 1994
- 192
-
Searching for Information| 1994
- 192
-
Books About the Internet| 1994
- 192
-
Network Security| 1994
- 192
-
Who Owns and Controls the Internet?| 1994
- 206
-
What do we mean by integrity?Courtney, Robert H. / Ware, Willis H. et al. | 1994
- 209
-
Fifty ways to secure dial-up connectionsWood, Charles Cresson et al. | 1994
- 217
-
Book ReviewsZajac, Bernard et al. | 1994
- 217
-
Applied cryptography: Protocols, algorithms, and source code in CZajac, Bernard P. Jr. et al. | 1994
- 218
-
Commonsense computer security — Your practical guide to information protection - 2nd editionZajac, Bernard P. Jr. et al. | 1994
- 218
-
Information security policies made easyZajac, Bernard P. Jr. et al. | 1994
- 221
-
Abstracts of recent articles and literatureCollinson, Helen et al. | 1994
- 226
-
Calendar of forthcoming conference and events| 1994
- 226
-
Calendar| 1994
- 229
-
International board of referees| 1994
- 231
-
Identity authentication in heterogeneous computing environments: a comparative study for an integrated frameworkKanungo, Shivraj et al. | 1994
- 255
-
A scheme to determine the relationship between two users in a hierarchyChang, C.C. / Jan, J.K. / Buehrer, D.J. et al. | 1994
- 263
-
High-level language computer viruses— a new threat?Magruder, Scott et al. | 1994
- 270
-
IFIP technical committee 11| 1994
- 274
-
Guide for authors| 1994