Previous Issue
Next Issue
Back to the Issues List
Back to the Journal Index
Search
|
 |
Computers & Security, Vol: 14, Issue: 7, 1995
-
Random Bits & Bytes
-
Controlling The Use Of Cryptographic Keys
-
Internet 101
-
The Controlled Application Set Paradigm for Trusted Systems
-
Maintaining Secrecy and Integrity in Multilevel Databases: A Practical Approach
-
TCP/IP (Lack of) Security
-
AIN'T Misbehaving -- A Taxonomy of Anti-Intrusion Techniques
-
A Software Architecture to Support Misuse Intrusion Detection
-
Securing Local Area and Metropolitan Area Network: A Practical Approach
-
Using Network Traffic Analysis as a Security Tool
-
A Perspective of Evaluation in the UK versus the US
-
ECMA's Approach for IT Security Evaluations
-
Critical Factors of Key Escrow Encryption Systems
-
Evaluating the Strength of Ciphers
-
Security and Software Reuse
-
An Open Trusted Enterprise Network Architecture
-
Component Architectures for Trusted NetWare
-
Social Engineering: The Only Real Test of Information Systems Security Plans
-
Contingency Planning: What to do When Bad Things Happen to Good Systems
-
Authorship Analysis: identifying The Author of a Program
-
Internet Sniffer Attacks
-
The Table of Contents for the 1st through the 17th National Computer Security Conferences
-
Alarm at increase in civil service crime
-
Security expert warns of night-time intruders
-
Top cop says fingerprint system is fraud-beater
-
BSA toughens up on pirates
-
Net surfer convicted for cache of child porn disks
-
Pressure builds on chip thieves
-
More security woes plague the Internet
-
Software pirates treasure Win 95
-
Protect your E-mail
-
E-mail security ignored
-
MCII offers Secure Transaction Service
-
Underground tools aid fledgling hackers
-
Oracle extinguishes Net security fears
-
Sentry cuts access to naughty bits
-
How secure is security
-
IBM unveils web servers, Internet firewall
-
Security environment reviews
-
Security and data integrity for LANS and WANs
-
Invasions of privacy
-
Setting optimal intrusion-detection thresholds
-
A methodology for the design of security plans
-
Managing computer crime: a research outlook
This journal issue is available on-line in the following forms:
|