Today's computer crime: The threat from within (English)
National licence
- New search for: ben-Aaron, Diana
- New search for: Green, Lee
- New search for: ben-Aaron, Diana
- New search for: Green, Lee
In:
Computers and Security
;
7
, 1
;
107
;
1988
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Today's computer crime: The threat from within
-
Contributors:ben-Aaron, Diana ( author ) / Green, Lee ( author )
-
Published in:Computers and Security ; 7, 1 ; 107
-
Publisher:
-
Publication date:1988-01-01
-
Size:1 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 7, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
From the editor| 1988
- 2
-
Editorial Board| 1988
- 3
-
Case history of a virus attackDr. Highland, Harold Joseph et al. | 1988
- 5
-
Encryption, attacks and ethicsDr. Highland, Harold Joseph et al. | 1988
- 6
-
How to protect a microcomputer systemDr. Highland, Harold Joseph et al. | 1988
- 7
-
Chernobyl computer communicationsDr. Highland, Harold Joseph et al. | 1988
- 9
-
Electromagnetic interferenceDr. Highland, Harold Joseph et al. | 1988
- 10
-
For your informationDr. Highland, Harold Joseph et al. | 1988
- 10
-
IFIP/Sec '88Dr. Highland, Harold Joseph et al. | 1988
- 13
-
Product reviewsDr. Highland, Harold Joseph et al. | 1988
- 19
-
Another perspective on sensitive but unclassified dataCourtney, Robert H. Jr. et al. | 1988
- 25
-
How secure are fiber optics communications?Dr. Highland, Harold Joseph et al. | 1988
- 27
-
Secretdisk II— transparent automatic encryptionDr. Highland, Harold Joseph et al. | 1988
- 35
-
Dial-up communication lines: Can they be secured?Zajac, Bernard P. Jr. et al. | 1988
- 37
-
Program aids for office automation securityDr. Highland,, Harold Joseph et al. | 1988
- 45
-
International board of referees| 1988
- 47
-
Getting started in data processing disaster recoveryMenkus, Belden et al. | 1988
- 53
-
Network security and access controlsAmsel,, Ellen et al. | 1988
- 59
-
Protecting statistical databases against retrieval of private informationAhituv, Niv / Lapid, Yeheskel / Neumann, Seev et al. | 1988
- 65
-
Message authentication and encryption combinedChristoffersson, Per et al. | 1988
- 73
-
Element-level classification with A1 assuranceLunt, Teresa F. / Denning, Dorothy E. / Schell, Roger R. / Heckman, Mark / Shockley, William R. et al. | 1988
- 83
-
A public-key cryptosystem based on language theorySalomaa, Arto et al. | 1988
- 89
-
New locks and keys for electronic information| 1988
- 95
-
IFIP technical committee 11| 1988
- 97
-
World-wide reports on developments in computer security| 1988
- 101
-
Anatomy of a disaster| 1988
- 101
-
Apple urges separate copyright registration of screen displays| 1988
- 101
-
Guidelines or standards! part one| 1988
- 101
-
Fighting software piracy| 1988
- 101
-
Justice Ordered to pay software licensing fees| 1988
- 102
-
MIS computer security slacking| 1988
- 102
-
NASA says classified data not breached| 1988
- 102
-
Lotus promises new releases, no protection| 1988
- 102
-
German computer hobbyists rifle NASA's files| 1988
- 102
-
Computer crime—What to do before it happens| 1988
- 102
-
1-2-3 to go unprotected| 1988
- 102
-
HK raid uncovers autodesk pirates| 1988
- 103
-
“Never mind!” businesses cool off on site license issue| 1988
- 103
-
When the password is a passkeyLewis, Peter H. et al. | 1988
- 103
-
Public policy and internal privacy codes| 1988
- 103
-
Report says computers spy on 7 million workers in US| 1988
- 103
-
Processing encrypted data| 1988
- 103
-
Tactical planning for data security management| 1988
- 103
-
Has EDP audit progressed in the last 15 years?Weber, Ron et al. | 1988
- 104
-
Disaster recovery neededHunter, Philip et al. | 1988
- 104
-
IBM slow to remedy leaky DB2 securityBozman, Jean S. et al. | 1988
- 104
-
Users see flaws in audit trails, access authorityBozman, Jean S. et al. | 1988
- 104
-
North didn't understand delete functionMcDonald, Evelyn C. et al. | 1988
- 104
-
Secure information is accurate informationHargrove, Robert et al. | 1988
- 104
-
The automated cryptananysis of polyalphabetic ciphersCarroll, John M. / Robbins, Lynda et al. | 1988
- 105
-
Computer trouble makes British skies unfriendlyHunter, Philip et al. | 1988
- 105
-
OSI security system revealedHorwitt, Elisabeth et al. | 1988
- 105
-
IBM users told data files could have legal pitfallsGoff, Leslie et al. | 1988
- 105
-
New risk management lab will tackle security needsMunro, Neil et al. | 1988
- 105
-
Analysis of the encryption algorithm used in the wordperfect word processing programBennett, John et al. | 1988
- 105
-
LA sites rockedJones, Stephen / Editors, Senior et al. | 1988
- 105
-
Data errors hurt state department systemGrimm, Vanessa Jo et al. | 1988
- 106
-
Fire and humidity: Data safes protect against bothSopko, Sandra et al. | 1988
- 106
-
Security and office automationWong, Ken et al. | 1988
- 106
-
Hospital's medical data held in strict security| 1988
- 106
-
Encryption standard to get reprieveBetts, Mitch et al. | 1988
- 106
-
LANS introduce new security issuesChandler, Harriette L. et al. | 1988
- 106
-
Security issues concern NSA, vendors| 1988
- 107
-
Development of confidence limits by pivotal functions for estimating software reliability| 1988
- 107
-
After the street's unforgettable week all info systems are (mostly) goCrockett, Barton / Medford, Cassimir J. et al. | 1988
- 107
-
Fault tolerant computers and multiprocessing. January 1985–June 1987| 1988
- 107
-
In London, stocks up and computers downHunter, Philip et al. | 1988
- 107
-
Today's computer crime: The threat from withinben-Aaron, Diana / Green, Lee et al. | 1988
- 107
-
In Japan, MIS weathers the storm easilyKo, Dorothy et al. | 1988
- 108
-
Public-private partners work on secure protocolsMiles, J.B. et al. | 1988
- 108
-
Unclassified security calls for a ‘friendly’ approachMiles, J.B. et al. | 1988
- 108
-
Expert tells DoD it needs training, not more tempestMunro, Neil et al. | 1988
- 108
-
Addresses of publications| 1988
- 108
-
Software still is arriving with those annoying bugsPerry, William E. et al. | 1988
- 111
-
Calendar| 1988