![]() |
| 1997 | ||
|---|---|---|
| 102 | EE | Harold Joseph Highland: Random bits & bytes & bytes. Computers & Security 16(1): 4-13 (1997) |
| 101 | EE | Harold Joseph Highland: Current literature The 19th National Information Systems Security Conference. Computers & Security 16(1): 47-59 (1997) |
| 100 | EE | Harold Joseph Highland: IFIP/SEC'97 conference proceedings. Computers & Security 16(3): 205 (1997) |
| 99 | Harold Joseph Highland: Random bits & bytes. Computers & Security 16(4): 266-275 (1997) | |
| 98 | EE | Harold Joseph Highland: The threats on the web. Computers & Security 16(5): 365-368 (1997) |
| 97 | EE | Harold Joseph Highland: Data encryption: A non-mathematical approach. Computers & Security 16(5): 369-386 (1997) |
| 96 | EE | Harold Joseph Highland: Historical bits & bytes. Computers & Security 16(5): 387-411 (1997) |
| 95 | EE | Harold Joseph Highland: A history of computer viruses - Introduction. Computers & Security 16(5): 412-415 (1997) |
| 94 | EE | Harold Joseph Highland: A history of computer viruses - The famous 'trio'. Computers & Security 16(5): 416-429 (1997) |
| 93 | EE | Harold Joseph Highland: A history of computer viruses: Three special viruses. Computers & Security 16(5): 430-438 (1997) |
| 92 | EE | Harold Joseph Highland: Procedures to reduce the computer virus threat. Computers & Security 16(5): 439-449 (1997) |
| 1996 | ||
| 91 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(1): 4-11 (1996) |
| 90 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(2): 90-99 (1996) |
| 89 | EE | Harold Joseph Highland: Random Bits & Bytes. Computers & Security 15(3): 184-197 (1996) |
| 88 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(4): 270-280 (1996) |
| 87 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(5): 356-366 (1996) |
| 86 | Harold Joseph Highland: IFIP TC 11 news. Computers & Security 15(5): 387-390 (1996) | |
| 85 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(6): 458-469 (1996) |
| 84 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(7): 552-560 (1996) |
| 83 | EE | Harold Joseph Highland: Passwords, the web, and the internet. Computers & Security 15(8): 654 (1996) |
| 82 | EE | Harold Joseph Highland: Pornography and privacy. Computers & Security 15(8): 654-655 (1996) |
| 81 | EE | Harold Joseph Highland: It's a web browser! No, it's a weapon! Computers & Security 15(8): 655-656 (1996) |
| 80 | EE | Harold Joseph Highland: Internet/web directory. Computers & Security 15(8): 656-657 (1996) |
| 79 | EE | Harold Joseph Highland: The enemy within. Computers & Security 15(8): 657 (1996) |
| 78 | EE | Harold Joseph Highland: Ntis volumes of interest. Computers & Security 15(8): 658-660 (1996) |
| 1995 | ||
| 77 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(1): 4-13 (1995) |
| 76 | EE | Harold Joseph Highland: Random Bits & Bytes. Computers & Security 14(2): 90-102 (1995) |
| 75 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(3): 188-196 (1995) |
| 74 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(4): 274-282 (1995) |
| 73 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(5): 365-371 (1995) |
| 72 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(6): 480-488 (1995) |
| 71 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(7): 574-585 (1995) |
| 70 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(8): 660-666 (1995) |
| 1994 | ||
| 69 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(1): 4-14 (1994) | |
| 68 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(2): 98-106 (1994) |
| 67 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(3): 192-205 (1994) | |
| 66 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(4): 278-286 (1994) | |
| 65 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(5): 372-378 (1994) | |
| 64 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(6): 458-465 (1994) | |
| 63 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(7): 540-546 (1994) | |
| 62 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(8): 622-627 (1994) | |
| 1993 | ||
| 61 | Harold Joseph Highland: A View of Information Security Tomorrow. SEC 1993: 1-11 | |
| 60 | Guy G. Gable, Harold Joseph Highland: Information Security in the Small Systems Context: A Framework for Understanding. SEC 1993: 37-51 | |
| 59 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(1): 4-14 (1993) | |
| 58 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(2): 106-116 (1993) |
| 57 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(3): 216-224 (1993) | |
| 56 | EE | Harold Joseph Highland: Conference report. Computers & Security 12(3): 249-253 (1993) |
| 55 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(5): 424-433 (1993) | |
| 54 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(6): 518-526 (1993) | |
| 53 | EE | Harold Joseph Highland: IFIP/Sec '93 conference report. Computers & Security 12(6): 550-555 (1993) |
| 52 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(7): 612-622 (1993) | |
| 51 | EE | Harold Joseph Highland: A view of information security tomorrow. Computers & Security 12(7): 634-639 (1993) |
| 50 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(8): 698-709 (1993) |
| 49 | EE | Harold Joseph Highland: 16th national computer security conference. Computers & Security 12(8): 730-734 (1993) |
| 1992 | ||
| 48 | Harold Joseph Highland: Perspectives in Information Technology Security. IFIP Congress (2) 1992: 440-446 | |
| 47 | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(1): 4-15 (1992) | |
| 46 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(2): 110-120 (1992) |
| 45 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(3): 200-209 (1992) |
| 44 | EE | Harold Joseph Highland: The security impact of networks, telecommunications, and office automation. Computers & Security 11(3): 227-232 (1992) |
| 43 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(4): 294-306 (1992) |
| 42 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(5): 390-406 (1992) |
| 41 | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(6): 498-507 (1992) | |
| 40 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(7): 592-601 (1992) |
| 39 | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(8): 682-694 (1992) | |
| 1991 | ||
| 38 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(1): 4-16 (1991) | |
| 37 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(2): 92-100 (1991) | |
| 36 | Harold Joseph Highland: A non-mathematical view of encryption. Computers & Security 10(3): 184-188 (1991) | |
| 35 | Harold Joseph Highland: Evaluating an encryption package. Computers & Security 10(3): 189-190 (1991) | |
| 34 | Harold Joseph Highland: Computers under attack. Computers & Security 10(3): 190-191 (1991) | |
| 33 | Harold Joseph Highland: Microcomputer utilities. Computers & Security 10(3): 191-195 (1991) | |
| 32 | Harold Joseph Highland: NTIS volumes of interest. Computers & Security 10(3): 195-198 (1991) | |
| 31 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(5): 384-397 (1991) |
| 30 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(6): 486-495 (1991) | |
| 29 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(7): 586-600 (1991) | |
| 28 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(8): 690-699 (1991) |
| 1990 | ||
| 27 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(1): 4-11 (1990) |
| 26 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(2): 102-109 (1990) |
| 25 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(3): 196-208 (1990) |
| 24 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(4): 282-294 (1990) |
| 23 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(5): 366-378 (1990) |
| 22 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(6): 470-482 (1990) |
| 21 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(7): 570-586 (1990) |
| 20 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(8): 660-675 (1990) |
| 1989 | ||
| 19 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(1): 2 (1989) |
| 18 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(1): 3-13 (1989) |
| 17 | EE | Harold Joseph Highland: Reports from the victims. Computers & Security 8(2): 101 (1989) |
| 16 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(2): 86 (1989) |
| 15 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(2): 91-100 (1989) |
| 14 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(3): 176-177 (1989) |
| 13 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(3): 178-188 (1989) |
| 12 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(4): 272-273 (1989) |
| 11 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(4): 274-282 (1989) |
| 10 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(5): 366-367 (1989) |
| 9 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(5): 369-380 (1989) |
| 8 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(6): 458-459 (1989) |
| 7 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(6): 460-478 (1989) |
| 6 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(7): 553-561 (1989) |
| 5 | EE | Harold Joseph Highland: Secret disk II - administrator. Computers & Security 8(7): 563-568 (1989) |
| 4 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(8): 644-646 (1989) |
| 3 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(8): 647-657 (1989) |
| 2 | EE | Harold Joseph Highland: Datacrime virus and new anti-virus products. Computers & Security 8(8): 659-661 (1989) |
| 1 | EE | Harold Joseph Highland: VCHECKER - a virus search program. Computers & Security 8(8): 669-674 (1989) |
| 1 | Guy G. Gable | [60] |