Volume 16; Issue 6

Computers & Security

Volume 16; Issue 6
1

Improved system-access control using complementary technologies

Year:
1997
Language:
english
File:
PDF, 536 KB
english, 1997
2

Building Chinese walls in standard unixTM

Year:
1997
Language:
english
File:
PDF, 1002 KB
english, 1997
3

From the editor

Year:
1997
Language:
english
File:
PDF, 181 KB
english, 1997
4

ISSO career development

Year:
1997
Language:
english
File:
PDF, 1017 KB
english, 1997
7

NT hackers warn of easy password interception

Year:
1997
Language:
english
File:
PDF, 97 KB
english, 1997
8

Novell gets $4 million in first fraud upgrade trial

Year:
1997
Language:
english
File:
PDF, 221 KB
english, 1997
9

Hackers blackmail Net businesses

Year:
1997
Language:
english
File:
PDF, 127 KB
english, 1997
10

MITI encryption-technology policy criticized

Year:
1997
Language:
english
File:
PDF, 127 KB
english, 1997
11

Shielding company data from internal threats

Year:
1997
Language:
english
File:
PDF, 127 KB
english, 1997
12

House committee backs Clinton on encryption

Year:
1997
Language:
english
File:
PDF, 251 KB
english, 1997
13

Future of Net cracked, flawed

Year:
1997
Language:
english
File:
PDF, 128 KB
english, 1997
14

Hacker tools can give IS a boost

Year:
1997
Language:
english
File:
PDF, 128 KB
english, 1997
15

E-signatures for the security conscious

Year:
1997
Language:
english
File:
PDF, 251 KB
english, 1997
16

Handle with care

Year:
1997
Language:
english
File:
PDF, 126 KB
english, 1997
17

Software AG extends mainframe security

Year:
1997
Language:
english
File:
PDF, 126 KB
english, 1997
18

Is your Web site secure?

Year:
1997
Language:
english
File:
PDF, 126 KB
english, 1997
19

Pact promises simplified security

Year:
1997
Language:
english
File:
PDF, 247 KB
english, 1997
20

The cherished keys to the kingdom

Year:
1997
Language:
english
File:
PDF, 126 KB
english, 1997
21

Computer doctor busy fighting ‘viruses’

Year:
1997
Language:
english
File:
PDF, 126 KB
english, 1997
22

Telecoms systems insecurity, exploitation, fraud

Year:
1997
Language:
english
File:
PDF, 249 KB
english, 1997
23

Bridging the business-to-business authentication gap

Year:
1997
Language:
english
File:
PDF, 126 KB
english, 1997
24

In the line of fire

Year:
1997
Language:
english
File:
PDF, 126 KB
english, 1997
25

Infosec folk art and beyond

Year:
1997
Language:
english
File:
PDF, 81 KB
english, 1997
26

Some observations on vulnerabilities

Year:
1997
Language:
english
File:
PDF, 81 KB
english, 1997
27

Internet E-mail security

Year:
1997
Language:
english
File:
PDF, 81 KB
english, 1997
28

Encryption policy — a UK perspective

Year:
1997
Language:
english
File:
PDF, 112 KB
english, 1997
29

The enemy everywhere

Year:
1997
Language:
english
File:
PDF, 112 KB
english, 1997
30

The spectrum of modern firewalls

Year:
1997
Language:
english
File:
PDF, 112 KB
english, 1997
31

Look back in wonder

Year:
1997
Language:
english
File:
PDF, 112 KB
english, 1997
32

What are certification authorities and what are they liable for?

Year:
1997
Language:
english
File:
PDF, 112 KB
english, 1997
33

Intrusion detection and response

Year:
1997
Language:
english
File:
PDF, 112 KB
english, 1997
34

Update on triple DES operations and crypto system initialization

Year:
1997
Language:
english
File:
PDF, 105 KB
english, 1997
35

Advanced auditing: Selecting and testing the right controls

Year:
1997
Language:
english
File:
PDF, 105 KB
english, 1997
36

20 years of DES — How it was designed

Year:
1997
Language:
english
File:
PDF, 105 KB
english, 1997
37

Internet encryption

Year:
1997
Language:
english
File:
PDF, 105 KB
english, 1997
38

Contracting a macro virus whilst surfing the internet

Year:
1997
Language:
english
File:
PDF, 105 KB
english, 1997
39

COBIT — Audit guidance on effective implementation

Year:
1997
Language:
english
File:
PDF, 197 KB
english, 1997
40

Computer-related fraud and its evolution within telephony

Year:
1997
Language:
english
File:
PDF, 98 KB
english, 1997
41

Telecommunications fraud, the gory details

Year:
1997
Language:
english
File:
PDF, 98 KB
english, 1997
42

PBX fraud, the final solution — Detection, deterrent, countermeasures

Year:
1997
Language:
english
File:
PDF, 98 KB
english, 1997
43

Windows NT security today and the future

Year:
1997
Language:
english
File:
PDF, 98 KB
english, 1997
44

Securing Windows NT in today's network environment

Year:
1997
Language:
english
File:
PDF, 216 KB
english, 1997
45

Unix security

Year:
1997
Language:
english
File:
PDF, 122 KB
english, 1997
46

Policies alone do not constitute a sufficient awareness effort

Year:
1997
Language:
english
File:
PDF, 122 KB
english, 1997
47

Addressing your information security skills shortages

Year:
1997
Language:
english
File:
PDF, 225 KB
english, 1997
48

Managing security for outsourcing contracts

Year:
1997
Language:
english
File:
PDF, 107 KB
english, 1997
49

Electronic commerce — The way forward

Year:
1997
Language:
english
File:
PDF, 107 KB
english, 1997
50

Creating a security culture

Year:
1997
Language:
english
File:
PDF, 107 KB
english, 1997
51

Bang goes your business

Year:
1997
Language:
english
File:
PDF, 107 KB
english, 1997
52

The importance of it security

Year:
1997
Language:
english
File:
PDF, 107 KB
english, 1997
53

NT server security, audit and control

Year:
1997
Language:
english
File:
PDF, 214 KB
english, 1997
54

Penetration testing

Year:
1997
Language:
english
File:
PDF, 113 KB
english, 1997
55

Key concerns in a review of CAACF2/MVS

Year:
1997
Language:
english
File:
PDF, 113 KB
english, 1997
56

Auditing the IT security function

Year:
1997
Language:
english
File:
PDF, 113 KB
english, 1997
57

Securing third party connections

Year:
1997
Language:
english
File:
PDF, 219 KB
english, 1997
58

Information warfare and defending the UK nation state

Year:
1997
Language:
english
File:
PDF, 110 KB
english, 1997
59

Essential controls for internet electronic commerce

Year:
1997
Language:
english
File:
PDF, 110 KB
english, 1997
60

Information flow within the globally connected environment

Year:
1997
Language:
english
File:
PDF, 110 KB
english, 1997
61

The strategic value of information in business

Year:
1997
Language:
english
File:
PDF, 110 KB
english, 1997
63

Intelligent agents: New security issues

Year:
1997
Language:
english
File:
PDF, 109 KB
english, 1997
64

The internet — A legal quagmire

Year:
1997
Language:
english
File:
PDF, 109 KB
english, 1997
65

A comparison between java and activeX security

Year:
1997
Language:
english
File:
PDF, 109 KB
english, 1997
66

The year 2000 problem

Year:
1997
Language:
english
File:
PDF, 109 KB
english, 1997
67

Smartcards — Is Britain getting smarter?

Year:
1997
Language:
english
File:
PDF, 109 KB
english, 1997
68

Embedded systems: The other problem

Year:
1997
Language:
english
File:
PDF, 111 KB
english, 1997
69

Blaming the victim

Year:
1997
Language:
english
File:
PDF, 111 KB
english, 1997
70

Calendar

Year:
1997
Language:
english
File:
PDF, 115 KB
english, 1997
71

Compsec '97 exhibitors

Year:
1997
Language:
english
File:
PDF, 889 KB
english, 1997
72

International Board of referees

Year:
1997
Language:
english
File:
PDF, 84 KB
english, 1997
73

IFIP technical committee 11

Year:
1997
Language:
english
File:
PDF, 241 KB
english, 1997
74

Update on the state of play in the hacker community

Year:
1997
Language:
english
File:
PDF, 98 KB
english, 1997