Electromagnetic interference (English)
National licence
- New search for: Dr. Highland, Harold Joseph
- New search for: Dr. Highland, Harold Joseph
In:
Computers and Security
;
7
, 1
;
9-10
;
1988
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Electromagnetic interference
-
Contributors:Dr. Highland, Harold Joseph ( author )
-
Published in:Computers and Security ; 7, 1 ; 9-10
-
Publisher:
-
Publication date:1988-01-01
-
Size:2 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 7, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
From the editor| 1988
- 2
-
Editorial Board| 1988
- 3
-
Case history of a virus attackDr. Highland, Harold Joseph et al. | 1988
- 5
-
Encryption, attacks and ethicsDr. Highland, Harold Joseph et al. | 1988
- 6
-
How to protect a microcomputer systemDr. Highland, Harold Joseph et al. | 1988
- 7
-
Chernobyl computer communicationsDr. Highland, Harold Joseph et al. | 1988
- 9
-
Electromagnetic interferenceDr. Highland, Harold Joseph et al. | 1988
- 10
-
IFIP/Sec '88Dr. Highland, Harold Joseph et al. | 1988
- 10
-
For your informationDr. Highland, Harold Joseph et al. | 1988
- 13
-
Product reviewsDr. Highland, Harold Joseph et al. | 1988
- 19
-
Another perspective on sensitive but unclassified dataCourtney, Robert H. Jr. et al. | 1988
- 25
-
How secure are fiber optics communications?Dr. Highland, Harold Joseph et al. | 1988
- 27
-
Secretdisk II— transparent automatic encryptionDr. Highland, Harold Joseph et al. | 1988
- 35
-
Dial-up communication lines: Can they be secured?Zajac, Bernard P. Jr. et al. | 1988
- 37
-
Program aids for office automation securityDr. Highland,, Harold Joseph et al. | 1988
- 45
-
International board of referees| 1988
- 47
-
Getting started in data processing disaster recoveryMenkus, Belden et al. | 1988
- 53
-
Network security and access controlsAmsel,, Ellen et al. | 1988
- 59
-
Protecting statistical databases against retrieval of private informationAhituv, Niv / Lapid, Yeheskel / Neumann, Seev et al. | 1988
- 65
-
Message authentication and encryption combinedChristoffersson, Per et al. | 1988
- 73
-
Element-level classification with A1 assuranceLunt, Teresa F. / Denning, Dorothy E. / Schell, Roger R. / Heckman, Mark / Shockley, William R. et al. | 1988
- 83
-
A public-key cryptosystem based on language theorySalomaa, Arto et al. | 1988
- 89
-
New locks and keys for electronic information| 1988
- 95
-
IFIP technical committee 11| 1988
- 97
-
World-wide reports on developments in computer security| 1988
- 101
-
Anatomy of a disaster| 1988
- 101
-
Apple urges separate copyright registration of screen displays| 1988
- 101
-
Guidelines or standards! part one| 1988
- 101
-
Fighting software piracy| 1988
- 101
-
Justice Ordered to pay software licensing fees| 1988
- 102
-
MIS computer security slacking| 1988
- 102
-
NASA says classified data not breached| 1988
- 102
-
Computer crime—What to do before it happens| 1988
- 102
-
Lotus promises new releases, no protection| 1988
- 102
-
German computer hobbyists rifle NASA's files| 1988
- 102
-
1-2-3 to go unprotected| 1988
- 102
-
HK raid uncovers autodesk pirates| 1988
- 103
-
When the password is a passkeyLewis, Peter H. et al. | 1988
- 103
-
Has EDP audit progressed in the last 15 years?Weber, Ron et al. | 1988
- 103
-
Processing encrypted data| 1988
- 103
-
Tactical planning for data security management| 1988
- 103
-
“Never mind!” businesses cool off on site license issue| 1988
- 103
-
Public policy and internal privacy codes| 1988
- 103
-
Report says computers spy on 7 million workers in US| 1988
- 104
-
Users see flaws in audit trails, access authorityBozman, Jean S. et al. | 1988
- 104
-
North didn't understand delete functionMcDonald, Evelyn C. et al. | 1988
- 104
-
Disaster recovery neededHunter, Philip et al. | 1988
- 104
-
Secure information is accurate informationHargrove, Robert et al. | 1988
- 104
-
The automated cryptananysis of polyalphabetic ciphersCarroll, John M. / Robbins, Lynda et al. | 1988
- 104
-
IBM slow to remedy leaky DB2 securityBozman, Jean S. et al. | 1988
- 105
-
Computer trouble makes British skies unfriendlyHunter, Philip et al. | 1988
- 105
-
IBM users told data files could have legal pitfallsGoff, Leslie et al. | 1988
- 105
-
New risk management lab will tackle security needsMunro, Neil et al. | 1988
- 105
-
Analysis of the encryption algorithm used in the wordperfect word processing programBennett, John et al. | 1988
- 105
-
LA sites rockedJones, Stephen / Editors, Senior et al. | 1988
- 105
-
OSI security system revealedHorwitt, Elisabeth et al. | 1988
- 105
-
Data errors hurt state department systemGrimm, Vanessa Jo et al. | 1988
- 106
-
LANS introduce new security issuesChandler, Harriette L. et al. | 1988
- 106
-
Encryption standard to get reprieveBetts, Mitch et al. | 1988
- 106
-
Hospital's medical data held in strict security| 1988
- 106
-
Security issues concern NSA, vendors| 1988
- 106
-
Fire and humidity: Data safes protect against bothSopko, Sandra et al. | 1988
- 106
-
Security and office automationWong, Ken et al. | 1988
- 107
-
After the street's unforgettable week all info systems are (mostly) goCrockett, Barton / Medford, Cassimir J. et al. | 1988
- 107
-
Fault tolerant computers and multiprocessing. January 1985–June 1987| 1988
- 107
-
In London, stocks up and computers downHunter, Philip et al. | 1988
- 107
-
Today's computer crime: The threat from withinben-Aaron, Diana / Green, Lee et al. | 1988
- 107
-
In Japan, MIS weathers the storm easilyKo, Dorothy et al. | 1988
- 107
-
Development of confidence limits by pivotal functions for estimating software reliability| 1988
- 108
-
Public-private partners work on secure protocolsMiles, J.B. et al. | 1988
- 108
-
Software still is arriving with those annoying bugsPerry, William E. et al. | 1988
- 108
-
Expert tells DoD it needs training, not more tempestMunro, Neil et al. | 1988
- 108
-
Unclassified security calls for a ‘friendly’ approachMiles, J.B. et al. | 1988
- 108
-
Addresses of publications| 1988
- 111
-
Calendar| 1988