books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 16; Issue 6
Main
Computers & Security
Volume 16; Issue 6
Computers & Security
Volume 16; Issue 6
1
Improved system-access control using complementary technologies
L. Labuschagne
,
J.H.P. Eloff
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 536 KB
Your tags:
english, 1997
2
Building Chinese walls in standard unixTM
Simon N. Foley
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 1002 KB
Your tags:
english, 1997
3
From the editor
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 181 KB
Your tags:
english, 1997
4
ISSO career development
Dr. Gerald Kovacich
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 1017 KB
Your tags:
english, 1997
5
Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain
Thomas Finne
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 1.09 MB
Your tags:
english, 1997
6
Two-phase cryptographic key recovery system
Rosario Gennaro
,
Paul Karger
,
Stephen Matyas
,
Mohammad Peyravian
,
Allen Roginsky
,
David Safford
,
Michael Willett
,
Nev Zunic
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 2.59 MB
Your tags:
english, 1997
7
NT hackers warn of easy password interception
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 97 KB
Your tags:
english, 1997
8
Novell gets $4 million in first fraud upgrade trial
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 221 KB
Your tags:
english, 1997
9
Hackers blackmail Net businesses
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 127 KB
Your tags:
english, 1997
10
MITI encryption-technology policy criticized
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 127 KB
Your tags:
english, 1997
11
Shielding company data from internal threats
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 127 KB
Your tags:
english, 1997
12
House committee backs Clinton on encryption
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 251 KB
Your tags:
english, 1997
13
Future of Net cracked, flawed
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 128 KB
Your tags:
english, 1997
14
Hacker tools can give IS a boost
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 128 KB
Your tags:
english, 1997
15
E-signatures for the security conscious
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 251 KB
Your tags:
english, 1997
16
Handle with care
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
17
Software AG extends mainframe security
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
18
Is your Web site secure?
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
19
Pact promises simplified security
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 247 KB
Your tags:
english, 1997
20
The cherished keys to the kingdom
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
21
Computer doctor busy fighting ‘viruses’
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
22
Telecoms systems insecurity, exploitation, fraud
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 249 KB
Your tags:
english, 1997
23
Bridging the business-to-business authentication gap
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
24
In the line of fire
Helen Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 126 KB
Your tags:
english, 1997
25
Infosec folk art and beyond
Donn B. Parker
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 81 KB
Your tags:
english, 1997
26
Some observations on vulnerabilities
Eugene Spafford
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 81 KB
Your tags:
english, 1997
27
Internet E-mail security
Peter Wood
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 81 KB
Your tags:
english, 1997
28
Encryption policy — a UK perspective
Nigel Hickson
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 112 KB
Your tags:
english, 1997
29
The enemy everywhere
Michael Bacon
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 112 KB
Your tags:
english, 1997
30
The spectrum of modern firewalls
Marius Nacht
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 112 KB
Your tags:
english, 1997
31
Look back in wonder
Chris Amery
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 112 KB
Your tags:
english, 1997
32
What are certification authorities and what are they liable for?
Tom Parker
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 112 KB
Your tags:
english, 1997
33
Intrusion detection and response
Fred Cohen
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 112 KB
Your tags:
english, 1997
34
Update on triple DES operations and crypto system initialization
Carl Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 105 KB
Your tags:
english, 1997
35
Advanced auditing: Selecting and testing the right controls
Keith Osborne
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 105 KB
Your tags:
english, 1997
36
20 years of DES — How it was designed
Carl Meyer
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 105 KB
Your tags:
english, 1997
37
Internet encryption
Paul Docherty
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 105 KB
Your tags:
english, 1997
38
Contracting a macro virus whilst surfing the internet
David Aubrey-Jones
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 105 KB
Your tags:
english, 1997
39
COBIT — Audit guidance on effective implementation
Vernon Pool
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 197 KB
Your tags:
english, 1997
40
Computer-related fraud and its evolution within telephony
Tom Mulhall
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 98 KB
Your tags:
english, 1997
41
Telecommunications fraud, the gory details
Peter Hoath
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 98 KB
Your tags:
english, 1997
42
PBX fraud, the final solution — Detection, deterrent, countermeasures
Tom Mulhall
,
Peter Hoath
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 98 KB
Your tags:
english, 1997
43
Windows NT security today and the future
Peter Birch
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 98 KB
Your tags:
english, 1997
44
Securing Windows NT in today's network environment
Eugene Schultz
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 216 KB
Your tags:
english, 1997
45
Unix security
Suleiman Shehu
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 122 KB
Your tags:
english, 1997
46
Policies alone do not constitute a sufficient awareness effort
Charles Cresson Wood
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 122 KB
Your tags:
english, 1997
47
Addressing your information security skills shortages
Bill Pepper
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 225 KB
Your tags:
english, 1997
48
Managing security for outsourcing contracts
John Sherwood
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 107 KB
Your tags:
english, 1997
49
Electronic commerce — The way forward
Terry Dosdale
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 107 KB
Your tags:
english, 1997
50
Creating a security culture
Heather Wilson
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 107 KB
Your tags:
english, 1997
51
Bang goes your business
Michael Bacon
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 107 KB
Your tags:
english, 1997
52
The importance of it security
Roderick Parkin
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 107 KB
Your tags:
english, 1997
53
NT server security, audit and control
Peter Wood
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 214 KB
Your tags:
english, 1997
54
Penetration testing
Gary Hardy
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 113 KB
Your tags:
english, 1997
55
Key concerns in a review of CAACF2/MVS
Norman Crocker
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 113 KB
Your tags:
english, 1997
56
Auditing the IT security function
Keith Osborne
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 113 KB
Your tags:
english, 1997
57
Securing third party connections
Eugene Schultz
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 219 KB
Your tags:
english, 1997
58
Information warfare and defending the UK nation state
Michael J. Corcoran
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 110 KB
Your tags:
english, 1997
59
Essential controls for internet electronic commerce
Charles Cresson Wood
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 110 KB
Your tags:
english, 1997
60
Information flow within the globally connected environment
Sarah Gordon
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 110 KB
Your tags:
english, 1997
61
The strategic value of information in business
Donn B. Parker
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 110 KB
Your tags:
english, 1997
62
Penetration testing and system audit — Experience gained and lessons learned during the investigation of systems within the United Kingdom
Andy Jones
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 215 KB
Your tags:
english, 1997
63
Intelligent agents: New security issues
Steve Bailey
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 109 KB
Your tags:
english, 1997
64
The internet — A legal quagmire
Mark Crichard
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 109 KB
Your tags:
english, 1997
65
A comparison between java and activeX security
David Hopwood
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 109 KB
Your tags:
english, 1997
66
The year 2000 problem
Margaret Joachim
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 109 KB
Your tags:
english, 1997
67
Smartcards — Is Britain getting smarter?
Alan Laird
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 109 KB
Your tags:
english, 1997
68
Embedded systems: The other problem
Alasdair Kemp
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 111 KB
Your tags:
english, 1997
69
Blaming the victim
Eugene Spafford
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 111 KB
Your tags:
english, 1997
70
Calendar
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 115 KB
Your tags:
english, 1997
71
Compsec '97 exhibitors
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 889 KB
Your tags:
english, 1997
72
International Board of referees
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 84 KB
Your tags:
english, 1997
73
IFIP technical committee 11
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 241 KB
Your tags:
english, 1997
74
Update on the state of play in the hacker community
Ken Lindup
Journal:
Computers & Security
Year:
1997
Language:
english
File:
PDF, 98 KB
Your tags:
english, 1997
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×