-
1
-
-
5844389392
-
Telecommuting IS security checklist
-
October
-
Anonymous (1998), "Telecommuting IS security checklist", EDPACS, October, pp. 8-12.
-
(1998)
EDPACS
, pp. 8-12
-
-
-
2
-
-
0029238493
-
Improving system security via proactive password checking
-
Bishop, M. and Klein, D. (1995), "Improving system security via proactive password checking", Computers and Security, pp. 233-49.
-
(1995)
Computers and Security
, pp. 233-249
-
-
Bishop, M.1
Klein, D.2
-
3
-
-
0031209960
-
The threat from the Net
-
August
-
Bishop, M., Cheung, S. and Wee, C. (1997), "The threat from the Net", IEEE Spectrum, August, pp. 56-63.
-
(1997)
IEEE Spectrum
, pp. 56-63
-
-
Bishop, M.1
Cheung, S.2
Wee, C.3
-
4
-
-
1842758924
-
Federal agencies fail security test
-
May
-
Didio, L. (1998a), "Federal agencies fail security test", Computerworld, May, p. 1617.
-
(1998)
Computerworld
, pp. 1617
-
-
Didio, L.1
-
5
-
-
5844402136
-
Ex-employee nabbed in $10 million hack attack
-
February
-
Didio, L. (1998b), "Ex-employee nabbed in $10 million hack attack", Computerworld, February, p. 6.
-
(1998)
Computerworld
, pp. 6
-
-
Didio, L.1
-
6
-
-
0004092884
-
-
The Benjamin Cummins Publishing Company, Inc., Menlo Park, CA
-
Elmasri, R. and Navathe, S. (1994), Fundamentals of Database Systems, 2nd ed., The Benjamin Cummins Publishing Company, Inc., Menlo Park, CA.
-
(1994)
Fundamentals of Database Systems, 2nd Ed.
-
-
Elmasri, R.1
Navathe, S.2
-
7
-
-
5844325375
-
Network security: Logging on to risk?
-
May
-
Fenelle, C. (1997), "Network security: logging on to risk?", Risk Management, May, p. 12.
-
(1997)
Risk Management
, pp. 12
-
-
Fenelle, C.1
-
8
-
-
5844402278
-
'Cookies' won't spoil your diet but might hurt Web security
-
July
-
Glass, B. (1996), "'Cookies' won't spoil your diet but might hurt Web security", Info World, July.
-
(1996)
Info World
-
-
Glass, B.1
-
9
-
-
5844320916
-
Are you threatening me? (and my system)
-
November
-
Helenius, T. (1998), "Are you threatening me? (and my system)", Wall Street and Technology, November, pp. 32-6.
-
(1998)
Wall Street and Technology
, pp. 32-36
-
-
Helenius, T.1
-
10
-
-
5844394906
-
An eight-step audit work program for TCP/IP
-
April
-
Hines, M. (1997), "An eight-step audit work program for TCP/IP", EDPACS, April, pp. 16-18.
-
(1997)
EDPACS
, pp. 16-18
-
-
Hines, M.1
-
11
-
-
5844384198
-
Web security to get simpler
-
July
-
Lawson, S. (1997), "Web security to get simpler", InfoWorld, July, pp. 1-24.
-
(1997)
InfoWorld
, pp. 1-24
-
-
Lawson, S.1
-
12
-
-
5844312713
-
Revision control for system administrators
-
May
-
Lefevre, W. (1998), "Revision control for system administrators", UNIX Reviewer's Performance Computing, May, pp. 25-9.
-
(1998)
UNIX Reviewer's Performance Computing
, pp. 25-29
-
-
Lefevre, W.1
-
13
-
-
1242331237
-
Guarding computer data
-
July
-
McFadden, P. J. (1997), "Guarding computer data", Journal of Accountancy, July, pp. 77-9.
-
(1997)
Journal of Accountancy
, pp. 77-79
-
-
McFadden, P.J.1
-
14
-
-
5844321073
-
Tool sweeps away Web security fear
-
July
-
Mills, E. (1996), "Tool sweeps away Web security fear", InfoWorld, July, pp. 1, 24.
-
(1996)
InfoWorld
, pp. 1
-
-
Mills, E.1
-
15
-
-
5844384199
-
Security in an uncertain world
-
October
-
Nelson, M. (1998) "Security in an uncertain world", InfoWorld, October, p. 42.
-
(1998)
InfoWorld
, pp. 42
-
-
Nelson, M.1
-
16
-
-
0002345890
-
Hackers: Can you stop them?
-
November
-
Phipps, J. (1998), "Hackers: can you stop them?", Editor and Publisher, November, pp. 4-8.
-
(1998)
Editor and Publisher
, pp. 4-8
-
-
Phipps, J.1
-
17
-
-
5844376400
-
Inside Internet security systems' SAFEsuite
-
May
-
Satdeva, B. (1998), "Inside Internet security systems' SAFEsuite", UNIX Review's Performance Computing, May, pp. 1-7.
-
(1998)
UNIX Review's Performance Computing
, pp. 1-7
-
-
Satdeva, B.1
-
18
-
-
5844368313
-
Network security for all
-
December
-
Scambray, J. (1998), "Network security for all", InfoWorld, December, pp. 68-71.
-
(1998)
InfoWorld
, pp. 68-71
-
-
Scambray, J.1
-
19
-
-
5844393606
-
Network security checkup
-
March
-
Talley, B., Scambray, J. and Broderick, J. (1998), "Network security checkup", InfoWorld, March, pp. 1, 54.
-
(1998)
InfoWorld
, pp. 1
-
-
Talley, B.1
Scambray, J.2
Broderick, J.3
|