2

Effective information system security with password controls

Year:
1983
Language:
english
File:
PDF, 674 KB
english, 1983
3

The human immune system as an information systems security reference model

Year:
1987
Language:
english
File:
PDF, 684 KB
english, 1987
4

Human error: an overlooked but significant information security problem

Year:
1993
Language:
english
File:
PDF, 679 KB
english, 1993
5

A secure password storage policy

Year:
1997
Language:
english
File:
PDF, 96 KB
english, 1997
6

Discrete Embeddings for Lagrangian and Hamiltonian Systems

Year:
2018
Language:
english
File:
PDF, 1.04 MB
english, 2018
8

Future applications of cryptography

Year:
1982
Language:
english
File:
PDF, 733 KB
english, 1982
9

Security modules: Potent information security system components

Year:
1986
Language:
english
File:
PDF, 805 KB
english, 1986
10

Principles of secure information systems design

Year:
1990
Language:
english
File:
PDF, 1.14 MB
english, 1990
11

Wireless network security

Year:
1995
Language:
english
File:
PDF, 118 KB
english, 1995
12

Establishing internal technical systems security standards

Year:
1986
Language:
english
File:
PDF, 876 KB
english, 1986
13

Information systems security: Management success factors

Year:
1987
Language:
english
File:
PDF, 814 KB
english, 1987
14

Results of experimental trials of the American anti-incrustator

Year:
1868
Language:
english
File:
PDF, 57 KB
english, 1868
16

The Latest Security Threat: Open-Book Management

Year:
1994
Language:
english
File:
PDF, 448 KB
english, 1994
18

The Charles Cresson Wood file

Year:
1995
Language:
english
File:
PDF, 23 KB
english, 1995
21

Majority report

Year:
1884
Language:
english
File:
PDF, 105 KB
english, 1884
22

Obituary

Year:
1888
Language:
english
File:
PDF, 198 KB
english, 1888
23

Policies for deterring computer abuse

Year:
1982
Language:
english
File:
PDF, 730 KB
english, 1982
24

Enhancing information security with the information resource management approach

Year:
1983
Language:
english
File:
PDF, 734 KB
english, 1983
25

Securicom '84

Year:
1984
Language:
english
File:
PDF, 315 KB
english, 1984
26

Floppy diskette security measures

Year:
1985
Language:
english
File:
PDF, 637 KB
english, 1985
27

Planning: A means to achieve data communications security

Year:
1989
Language:
english
File:
PDF, 1.03 MB
english, 1989
28

How many information security staff people should you have?

Year:
1990
Language:
english
File:
PDF, 730 KB
english, 1990
29

Using information security to achieve competitive advantage

Year:
1991
Language:
english
File:
PDF, 565 KB
english, 1991
30

Duress terminations and information security

Year:
1993
Language:
english
File:
PDF, 902 KB
english, 1993
31

Principles of secure information systems design with groupware examples

Year:
1993
Language:
english
File:
PDF, 1.65 MB
english, 1993
32

ISO 9000 and information security

Year:
1995
Language:
english
File:
PDF, 172 KB
english, 1995
34

Writing infosec policies

Year:
1995
Language:
english
File:
PDF, 105 KB
english, 1995
35

Writing infosec policies

Year:
1995
Language:
english
File:
PDF, 865 KB
english, 1995
36

Effective information system security with password controls

Year:
1983
Language:
english
File:
PDF, 129 KB
english, 1983
37

An Internet Curmudgeon's rants

Year:
1996
Language:
english
File:
PDF, 244 KB
english, 1996
40

A management view of internet electronic commerce security

Year:
1997
Language:
english
File:
PDF, 586 KB
english, 1997
41

Policies alone do not constitute a sufficient awareness effort

Year:
1997
Language:
english
File:
PDF, 122 KB
english, 1997
42

Essential controls for internet electronic commerce

Year:
1997
Language:
english
File:
PDF, 110 KB
english, 1997
43

Essential controls for internet electronic commerce

Year:
1998
Language:
english
File:
PDF, 726 KB
english, 1998
45

A context for information systems security planning

Year:
1988
Language:
english
File:
PDF, 968 KB
english, 1988
46

Fifteen major forces driving the civilian information security market

Year:
1990
Language:
english
File:
PDF, 963 KB
english, 1990
47

Burning computer security, privacy, and freedom issues

Year:
1991
Language:
english
File:
PDF, 935 KB
english, 1991
48

Fifty ways to secure dial-up connections

Year:
1994
Language:
english
File:
PDF, 774 KB
english, 1994
49

An Unappreciated Reason Why Information Security Policies Fail

Year:
2000
Language:
english
File:
PDF, 137 KB
english, 2000