Volume 7; Issue 5

Computers & Security

Volume 7; Issue 5
1

From the editor

Year:
1988
Language:
english
File:
PDF, 64 KB
english, 1988
2

U.S. Congress computer virus report

Year:
1988
Language:
english
File:
PDF, 75 KB
english, 1988
3

Write-protect tab warning

Year:
1988
Language:
english
File:
PDF, 75 KB
english, 1988
4

Virus filter evaluation

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
5

Viruses: Should we quit talking about them?

Year:
1988
Language:
english
File:
PDF, 168 KB
english, 1988
6

Solutions to the multidestination secure electronic mail problem

Year:
1988
Language:
english
File:
PDF, 472 KB
english, 1988
7

Maintaining a poor person's information integrity

Year:
1988
Language:
english
File:
PDF, 495 KB
english, 1988
9

Some weak points of one fast cryptographic checksum algorithm and its improvement

Year:
1988
Language:
english
File:
PDF, 218 KB
english, 1988
10

IFIP Technical Committee 11

Year:
1988
Language:
english
File:
PDF, 84 KB
english, 1988
11

Computer information security and protection. June 1985– April 1987 (Citations from the NTIS database)

Year:
1988
Language:
english
File:
PDF, 83 KB
english, 1988
13

Risk Assessment Methodology for Software Supportability (RAMSS): User's handbook

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
15

Implementing the RSA cryptosystem

Year:
1988
Language:
english
File:
PDF, 188 KB
english, 1988
17

Information theory and public key cryptosystems

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
19

Use of colour on electronic data displays (second study)

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
21

Expert system for software quality assurance

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
22

Intellectual property rights in an age of electronics and information. Contractor documents. Volume 1

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
23

Security considerations— defence-related and commercial

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
26

Data acquisition, reduction, and analysis using a microcomputer

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
27

Intellectual property rights in an age of electronics and information. Contractor documents. Volume 2

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
29

Testing OSI (Open Systems Interconnection) protocols at the National Bureau of Standards

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
30

CONST—a constructive approach to information modelling

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
32

Guidance on software package selection

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
33

Congestion control in routing networks

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
34

Local area networks. January 1986–December 1986 (citations from the engineering index database)

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
36

Managing the data analysis process

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
37

Annotated bibliography on software maintenance

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
38

Management overview of software reuse

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
40

Understanding user attitudes: The cornerstone of computer documentation

Year:
1988
Language:
english
File:
PDF, 190 KB
english, 1988
41

Software error experiment

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
42

Workstation/mainframe connection

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
43

Guidelines for preparing software user documentation

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
46

Design of a real time operating system for a fault tolerant microcomputer

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
47

Data compression: Techniques and applications. October 1983–September 1986

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
48

Computer software transferability and portability. January 1970–August 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
49

Directory of computerized data files, 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
50

Data compression: Techniques and applications. October 1983–September 1986

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
51

Data compression: Techniques and applications. October 1986–September 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
52

Some complexity theory for cryptography

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
53

IC card with a microprocessor

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
54

Cryptography and cryptosystems. January 1970– October 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
55

Computer communications software. January 1975– October 1986

Year:
1988
Language:
english
File:
PDF, 181 KB
english, 1988
56

Neutral computers, auditing and security

Year:
1988
Language:
english
File:
PDF, 89 KB
english, 1988
57

“Look-and-feel” decision looms

Year:
1988
Language:
english
File:
PDF, 79 KB
english, 1988
58

Microsoft, H-P shrug off apple suit

Year:
1988
Language:
english
File:
PDF, 79 KB
english, 1988
59

H-P countersues apple

Year:
1988
Language:
english
File:
PDF, 79 KB
english, 1988
60

Apple property rights suit can backfire

Year:
1988
Language:
english
File:
PDF, 173 KB
english, 1988
61

Police chief of Metro-North indicted in computer misuse

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
62

Copyright issue blurs

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
63

Sabotage aimed at computer company destroys government data

Year:
1988
Language:
english
File:
PDF, 185 KB
english, 1988
64

No vaccine to ward off effects of virus attacks

Year:
1988
Language:
english
File:
PDF, 91 KB
english, 1988
65

Recovering from a computer virus attack

Year:
1988
Language:
english
File:
PDF, 91 KB
english, 1988
66

“Remember to lock the door”: MMI and the Hacker

Year:
1988
Language:
english
File:
PDF, 91 KB
english, 1988
67

Access-control software

Year:
1988
Language:
english
File:
PDF, 91 KB
english, 1988
68

Access control methods of VAX/VMS

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
69

Public policy origins of telecommunications privacy and the emerging issues

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
70

Curing back-up blues

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
71

Protection from power gremlins

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
72

Checking out your security system

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
73

Make security a priority at start of LAN installation

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
74

Government beefs up internal data security

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
75

Begin contingency planning or you might become an outlaw

Year:
1988
Language:
english
File:
PDF, 191 KB
english, 1988
76

Approach your hot site as home away from home

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
77

Biometrics: The future in security methods?

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
78

Computer “Hackers” viewed as a threat to phone security

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
79

Hill might punish security lapses

Year:
1988
Language:
english
File:
PDF, 97 KB
english, 1988
80

$3 million computer security plan

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
81

Few data centers planning for the big one

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
82

Most DOD computers to meet C-2 security by '92

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
83

Using data safes to protect information

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
84

Privacy and databases: A question of dignity

Year:
1988
Language:
english
File:
PDF, 179 KB
english, 1988
85

Addresses of publications

Year:
1988
Language:
english
File:
PDF, 87 KB
english, 1988
86

Calendar

Year:
1988
File:
PDF, 25 KB
1988
87

Virus filter update

Year:
1988
Language:
english
File:
PDF, 110 KB
english, 1988
88

Computer viruses: Media hyperbole, errors and ignorance

Year:
1988
Language:
english
File:
PDF, 574 KB
english, 1988
89

The case of the “Gerbil virus” that wasn't

Year:
1988
Language:
english
File:
PDF, 193 KB
english, 1988
90

A context for information systems security planning

Year:
1988
Language:
english
File:
PDF, 968 KB
english, 1988
91

Security news briefs

Year:
1988
Language:
english
File:
PDF, 256 KB
english, 1988
92

International board of referees

Year:
1988
Language:
english
File:
PDF, 62 KB
english, 1988
94

Microcomputer security issues in an office environment

Year:
1988
Language:
english
File:
PDF, 83 KB
english, 1988
95

Analysis of individual risk belief structures

Year:
1988
Language:
english
File:
PDF, 179 KB
english, 1988
98

Computer information security and protection. November 1986–October 1987

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
99

Computer performance evaluation. July 1983–April 1988 (citations from the NTIS database)

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
100

Secure software verification tools

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
101

Innovative workstation

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
104

Data quality: A strategic perspective

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
105

ELAND: An expert system for the configuration of local area networks applications

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
108

Central computer facility software directory

Year:
1988
Language:
english
File:
PDF, 93 KB
english, 1988
110

National survey of worksite health promotion programs, 1985

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
111

Recovery using virtual memory

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
113

Computer voice recognition: Market aspects. January 1983– July 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
114

Computer software maintenance. January 1970– August 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
115

Handwriting recognition by computer. January 1970– August 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
116

Smart cards. January 1983– August 1987

Year:
1988
Language:
english
File:
PDF, 185 KB
english, 1988
117

Expert systems: Non-industrial applications. January 1984–March 1987

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988
118

Computer communications software. November 1986– September 1987

Year:
1988
Language:
english
File:
PDF, 89 KB
english, 1988
119

Industry praises copyright decision

Year:
1988
Language:
english
File:
PDF, 79 KB
english, 1988
120

Bill to regulate data matching moves to floor

Year:
1988
Language:
english
File:
PDF, 79 KB
english, 1988
121

Unisys Canada slaps $500 K lawsuit on firm

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
122

Computer viruses strike colleges and companies, leaving them defensive

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
123

Scent of money lures firms to jump on antiviral bandwagon

Year:
1988
Language:
english
File:
PDF, 91 KB
english, 1988
124

Security in open system networks: A tutorial survey

Year:
1988
Language:
english
File:
PDF, 91 KB
english, 1988
125

Wider threat to privacy seen as computer memories grow

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
126

Securing satellite signals

Year:
1988
Language:
english
File:
PDF, 96 KB
english, 1988
127

Hacker accesses DOD network

Year:
1988
Language:
english
File:
PDF, 190 KB
english, 1988
128

System crash foils swiss bank theft

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
129

Air force mounts offensive against computer crime

Year:
1988
Language:
english
File:
PDF, 95 KB
english, 1988
130

Securing the RSA- cryptosystem against cycling attacks

Year:
1988
Language:
english
File:
PDF, 190 KB
english, 1988
131

Latest GAO security study has flaws of its own

Year:
1988
Language:
english
File:
PDF, 94 KB
english, 1988