1997 | ||
---|---|---|
102 | EE | Harold Joseph Highland: Random bits & bytes & bytes. Computers & Security 16(1): 4-13 (1997) |
101 | EE | Harold Joseph Highland: Current literature The 19th National Information Systems Security Conference. Computers & Security 16(1): 47-59 (1997) |
100 | EE | Harold Joseph Highland: IFIP/SEC'97 conference proceedings. Computers & Security 16(3): 205 (1997) |
99 | Harold Joseph Highland: Random bits & bytes. Computers & Security 16(4): 266-275 (1997) | |
98 | EE | Harold Joseph Highland: The threats on the web. Computers & Security 16(5): 365-368 (1997) |
97 | EE | Harold Joseph Highland: Data encryption: A non-mathematical approach. Computers & Security 16(5): 369-386 (1997) |
96 | EE | Harold Joseph Highland: Historical bits & bytes. Computers & Security 16(5): 387-411 (1997) |
95 | EE | Harold Joseph Highland: A history of computer viruses - Introduction. Computers & Security 16(5): 412-415 (1997) |
94 | EE | Harold Joseph Highland: A history of computer viruses - The famous 'trio'. Computers & Security 16(5): 416-429 (1997) |
93 | EE | Harold Joseph Highland: A history of computer viruses: Three special viruses. Computers & Security 16(5): 430-438 (1997) |
92 | EE | Harold Joseph Highland: Procedures to reduce the computer virus threat. Computers & Security 16(5): 439-449 (1997) |
1996 | ||
91 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(1): 4-11 (1996) |
90 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(2): 90-99 (1996) |
89 | EE | Harold Joseph Highland: Random Bits & Bytes. Computers & Security 15(3): 184-197 (1996) |
88 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(4): 270-280 (1996) |
87 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(5): 356-366 (1996) |
86 | Harold Joseph Highland: IFIP TC 11 news. Computers & Security 15(5): 387-390 (1996) | |
85 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(6): 458-469 (1996) |
84 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 15(7): 552-560 (1996) |
83 | EE | Harold Joseph Highland: Passwords, the web, and the internet. Computers & Security 15(8): 654 (1996) |
82 | EE | Harold Joseph Highland: Pornography and privacy. Computers & Security 15(8): 654-655 (1996) |
81 | EE | Harold Joseph Highland: It's a web browser! No, it's a weapon! Computers & Security 15(8): 655-656 (1996) |
80 | EE | Harold Joseph Highland: Internet/web directory. Computers & Security 15(8): 656-657 (1996) |
79 | EE | Harold Joseph Highland: The enemy within. Computers & Security 15(8): 657 (1996) |
78 | EE | Harold Joseph Highland: Ntis volumes of interest. Computers & Security 15(8): 658-660 (1996) |
1995 | ||
77 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(1): 4-13 (1995) |
76 | EE | Harold Joseph Highland: Random Bits & Bytes. Computers & Security 14(2): 90-102 (1995) |
75 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(3): 188-196 (1995) |
74 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(4): 274-282 (1995) |
73 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(5): 365-371 (1995) |
72 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(6): 480-488 (1995) |
71 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(7): 574-585 (1995) |
70 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 14(8): 660-666 (1995) |
1994 | ||
69 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(1): 4-14 (1994) | |
68 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(2): 98-106 (1994) |
67 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(3): 192-205 (1994) | |
66 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(4): 278-286 (1994) | |
65 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(5): 372-378 (1994) | |
64 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(6): 458-465 (1994) | |
63 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(7): 540-546 (1994) | |
62 | Harold Joseph Highland: Random bits & bytes. Computers & Security 13(8): 622-627 (1994) | |
1993 | ||
61 | Harold Joseph Highland: A View of Information Security Tomorrow. SEC 1993: 1-11 | |
60 | Guy G. Gable, Harold Joseph Highland: Information Security in the Small Systems Context: A Framework for Understanding. SEC 1993: 37-51 | |
59 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(1): 4-14 (1993) | |
58 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(2): 106-116 (1993) |
57 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(3): 216-224 (1993) | |
56 | EE | Harold Joseph Highland: Conference report. Computers & Security 12(3): 249-253 (1993) |
55 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(5): 424-433 (1993) | |
54 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(6): 518-526 (1993) | |
53 | EE | Harold Joseph Highland: IFIP/Sec '93 conference report. Computers & Security 12(6): 550-555 (1993) |
52 | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(7): 612-622 (1993) | |
51 | EE | Harold Joseph Highland: A view of information security tomorrow. Computers & Security 12(7): 634-639 (1993) |
50 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 12(8): 698-709 (1993) |
49 | EE | Harold Joseph Highland: 16th national computer security conference. Computers & Security 12(8): 730-734 (1993) |
1992 | ||
48 | Harold Joseph Highland: Perspectives in Information Technology Security. IFIP Congress (2) 1992: 440-446 | |
47 | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(1): 4-15 (1992) | |
46 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(2): 110-120 (1992) |
45 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(3): 200-209 (1992) |
44 | EE | Harold Joseph Highland: The security impact of networks, telecommunications, and office automation. Computers & Security 11(3): 227-232 (1992) |
43 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(4): 294-306 (1992) |
42 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(5): 390-406 (1992) |
41 | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(6): 498-507 (1992) | |
40 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(7): 592-601 (1992) |
39 | Harold Joseph Highland: Random bits & bytes. Computers & Security 11(8): 682-694 (1992) | |
1991 | ||
38 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(1): 4-16 (1991) | |
37 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(2): 92-100 (1991) | |
36 | Harold Joseph Highland: A non-mathematical view of encryption. Computers & Security 10(3): 184-188 (1991) | |
35 | Harold Joseph Highland: Evaluating an encryption package. Computers & Security 10(3): 189-190 (1991) | |
34 | Harold Joseph Highland: Computers under attack. Computers & Security 10(3): 190-191 (1991) | |
33 | Harold Joseph Highland: Microcomputer utilities. Computers & Security 10(3): 191-195 (1991) | |
32 | Harold Joseph Highland: NTIS volumes of interest. Computers & Security 10(3): 195-198 (1991) | |
31 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(5): 384-397 (1991) |
30 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(6): 486-495 (1991) | |
29 | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(7): 586-600 (1991) | |
28 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 10(8): 690-699 (1991) |
1990 | ||
27 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(1): 4-11 (1990) |
26 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(2): 102-109 (1990) |
25 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(3): 196-208 (1990) |
24 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(4): 282-294 (1990) |
23 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(5): 366-378 (1990) |
22 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(6): 470-482 (1990) |
21 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(7): 570-586 (1990) |
20 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 9(8): 660-675 (1990) |
1989 | ||
19 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(1): 2 (1989) |
18 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(1): 3-13 (1989) |
17 | EE | Harold Joseph Highland: Reports from the victims. Computers & Security 8(2): 101 (1989) |
16 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(2): 86 (1989) |
15 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(2): 91-100 (1989) |
14 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(3): 176-177 (1989) |
13 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(3): 178-188 (1989) |
12 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(4): 272-273 (1989) |
11 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(4): 274-282 (1989) |
10 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(5): 366-367 (1989) |
9 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(5): 369-380 (1989) |
8 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(6): 458-459 (1989) |
7 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(6): 460-478 (1989) |
6 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(7): 553-561 (1989) |
5 | EE | Harold Joseph Highland: Secret disk II - administrator. Computers & Security 8(7): 563-568 (1989) |
4 | EE | Harold Joseph Highland: From the editor. Computers & Security 8(8): 644-646 (1989) |
3 | EE | Harold Joseph Highland: Random bits & bytes. Computers & Security 8(8): 647-657 (1989) |
2 | EE | Harold Joseph Highland: Datacrime virus and new anti-virus products. Computers & Security 8(8): 659-661 (1989) |
1 | EE | Harold Joseph Highland: VCHECKER - a virus search program. Computers & Security 8(8): 669-674 (1989) |
1 | Guy G. Gable | [60] |