books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 14; Issue 1
Main
Computers & Security
Volume 14; Issue 1
Computers & Security
Volume 14; Issue 1
1
Editorial Board
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 102 KB
Your tags:
english, 1995
2
From the editor
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 168 KB
Your tags:
english, 1995
3
IFIP TC 11 news
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 156 KB
Your tags:
english, 1995
4
London Borough innocent victim of computer fraud.
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 266 KB
Your tags:
english, 1995
5
CSIS watchdog finds possible breach of secrets in fighting high-tech crime.
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 135 KB
Your tags:
english, 1995
6
World Institute for Security Enhancement
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 143 KB
Your tags:
english, 1995
7
Crypto system battles video pirates
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 270 KB
Your tags:
english, 1995
8
Is anything safe anymore?
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 130 KB
Your tags:
english, 1995
9
IFIP Technical Committee 11
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 248 KB
Your tags:
english, 1995
10
Business continuity planning
Martin Smith
,
John Sherwood
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 1016 KB
Your tags:
english, 1995
11
The RSA Security Conference 1995
Edwin B. Heinlein
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 274 KB
Your tags:
english, 1995
12
Using Application Profiles to Detect Computer Misuse : Nancy Kelem and Daniel Sterne, Trusted Information Systems, Mountain View, CA; Debra Anderson, SRI International, Menio Park, CA; and Linda Lankewicz, Spring Hill College, Mobile, AL
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 97 KB
Your tags:
english, 1995
13
A Pattern Matching Model for Misuse Intrusion Detection : Sandeep Kumar and Eugene Spafford, Purdue University, West Lafayette, IN
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 113 KB
Your tags:
english, 1995
14
Testing Intrusion Detection Systems: Design Methodologies and Results from an Early Prototype : Nicholas Puketza, Kiswanath Mukherjee, Ronald Olsson and Kui Zhang, University of California, Davis, CA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 113 KB
Your tags:
english, 1995
15
What Color is Your Assurance? : David Wichers, Joel Sachs and Douglas Landoll, Area Systems Inc, Columbia, MD
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 113 KB
Your tags:
english, 1995
16
A Financial Management Approach for Selecting Optimal, Cost-effective Safeguards Upgrades for Computer- and Information- Security Risk Management : Suzanne Smith, Baranca Inc, Los Almos, NM, and Stephen Gale and William Malampy, University of Pennsylvania, Philadelphia, PA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 237 KB
Your tags:
english, 1995
17
The Sea View Prototype: Project Summary : Teresa Lunt and Peter Boucher, SRI International, Menio Park, CA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1995
18
Towards a Formal Verification of a Secure and Distributed System and its Applications : Cui Zhang, Rob Shaw, Mark Heckman, Gregory Benson, Myla Archer, Karl Levitt and Ronald Olsson, Dept. Computer Science, University of California, Davis, CA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1995
19
Implementing Role Based, Clark-Wilson Enforcement Rules in a Bl Online Transaction Processing System : Barbara Smith-Thomas, AT&T Bell Laboratories, Greensboro, NC and Wang Chao-Yeuh, Institute for Information Industry, Taipei, Taiwan
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1995
20
Partitioning the Security Analysis of Complex Systems : Howard Holm, National Security Agency, Fort Meade, MD
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 115 KB
Your tags:
english, 1995
21
Support for Security in Distributed Systems Using Messiahs : Steve Chapin, Kent State University, Kent, OH and Eugene Spafford, Purdue University, West Lafayette, IN
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 115 KB
Your tags:
english, 1995
22
A Taxonomy for Security Standards : WayneJansen, National Institute of Standards and Technology, Gaithersburg, MD
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 115 KB
Your tags:
english, 1995
23
The Electronic Intrusion Threat to National Security & Emergency Preparedness Telecommunications: An Awareness Document : Dr. Joseph Frizzell, National Communications System, Arlington, VA and Ted Phillips and Traigh Grover,Booz, Alien & Hamilton Inc, McLean, VA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 232 KB
Your tags:
english, 1995
24
Exporting Evaluation: An Analysis of US and Canadian Criteria for Trust : Paul Olson
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 119 KB
Your tags:
english, 1995
25
Virtual View Model to Design a Secure Object-Oriented Database : N. Boulahia-Cuppens, F. Cuppens, A. Gabillon, K. Yazdaman, ONERA/CERT, Cedex, France
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 119 KB
Your tags:
english, 1995
26
Modern Multilevel Security (MLS): Practical Approaches for Integration, Certification and Accreditation : Bill Neugent, Mike Burgoon,Jeanne Firev and Mundv Rudell. The MITRE Corporation. McL.ean, VA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 143 KB
Your tags:
english, 1995
27
Hackers take revenge on the author of new book on Cyberspace wars
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 95 KB
Your tags:
english, 1995
28
Minnesota teen nabbed in computer hacker case
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 134 KB
Your tags:
english, 1995
29
The Electronic wallet: secure payment methods sought for Internet
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 134 KB
Your tags:
english, 1995
30
US rattles a sabre at Chinese pirates
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 275 KB
Your tags:
english, 1995
31
SCO patches
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 143 KB
Your tags:
english, 1995
32
Copy protection, the sequel: coming to a PC near you
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 130 KB
Your tags:
english, 1995
33
Help: working smarter lock, stock and password
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 130 KB
Your tags:
english, 1995
34
Secure EDI over the Internet
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 130 KB
Your tags:
english, 1995
35
A recipe for hacker heartburn
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 130 KB
Your tags:
english, 1995
36
Trusted system concepts
Marshall D. Abrams
,
Michael V. Joyce
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 1.18 MB
Your tags:
english, 1995
37
Trusted computing update
Marshall D. Abrams
,
Michael V. Joyce
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 1.14 MB
Your tags:
english, 1995
38
New thinking about information technology security
Marshall D. Abrams
,
Michael V. Joyce
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 1.25 MB
Your tags:
english, 1995
39
Dial a Star? Utahn faces felony for accessing numbers
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 134 KB
Your tags:
english, 1995
40
BSA cracks down on piracy in NZ
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 135 KB
Your tags:
english, 1995
41
Security across the LAN
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 130 KB
Your tags:
english, 1995
42
Calendar
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 116 KB
Your tags:
english, 1995
43
International board of referees
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 59 KB
Your tags:
english, 1995
44
Random bits & bytes
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 1.10 MB
Your tags:
english, 1995
45
Security Awareness and the Persuasion of Mmanagers : Dennis Poindexter, Professionalization Directorate, TGB. Arlington, VA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 97 KB
Your tags:
english, 1995
46
Belief in Correctness : Marshall Abrams, The MITRE Corporation, McLean, VA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 207 KB
Your tags:
english, 1995
47
Can Computer Crime be Deterred : Sanford Sherizen, Data Security Systems, Inc, Natick, MA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 113 KB
Your tags:
english, 1995
48
Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System : Jeremy Epstein, Gary Grossman, Frederick Maxwell, Nobel Veirs III, Albert Donaldson, and Cornelius Hal ey; Cordant Inc, Reston, VA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 115 KB
Your tags:
english, 1995
49
Artificial Intelligence and Intrusion Detection: Current and Future Directions : Jeremy Frank, University of California, Davis, CA
Harold Joseph Highland
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 119 KB
Your tags:
english, 1995
50
Computer Security Centre to be set up
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 95 KB
Your tags:
english, 1995
51
Cops of the dataway.
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 134 KB
Your tags:
english, 1995
52
Will Privacy vanish along with wires?
Helen Collinson
Journal:
Computers & Security
Year:
1995
Language:
english
File:
PDF, 135 KB
Your tags:
english, 1995
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×