dblp.uni-trier.dewww.uni-trier.de

Harold Joseph Highland

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

1997
102EEHarold Joseph Highland: Random bits & bytes & bytes. Computers & Security 16(1): 4-13 (1997)
101EEHarold Joseph Highland: Current literature The 19th National Information Systems Security Conference. Computers & Security 16(1): 47-59 (1997)
100EEHarold Joseph Highland: IFIP/SEC'97 conference proceedings. Computers & Security 16(3): 205 (1997)
99 Harold Joseph Highland: Random bits & bytes. Computers & Security 16(4): 266-275 (1997)
98EEHarold Joseph Highland: The threats on the web. Computers & Security 16(5): 365-368 (1997)
97EEHarold Joseph Highland: Data encryption: A non-mathematical approach. Computers & Security 16(5): 369-386 (1997)
96EEHarold Joseph Highland: Historical bits & bytes. Computers & Security 16(5): 387-411 (1997)
95EEHarold Joseph Highland: A history of computer viruses - Introduction. Computers & Security 16(5): 412-415 (1997)
94EEHarold Joseph Highland: A history of computer viruses - The famous 'trio'. Computers & Security 16(5): 416-429 (1997)
93EEHarold Joseph Highland: A history of computer viruses: Three special viruses. Computers & Security 16(5): 430-438 (1997)
92EEHarold Joseph Highland: Procedures to reduce the computer virus threat. Computers & Security 16(5): 439-449 (1997)
1996
91EEHarold Joseph Highland: Random bits & bytes. Computers & Security 15(1): 4-11 (1996)
90EEHarold Joseph Highland: Random bits & bytes. Computers & Security 15(2): 90-99 (1996)
89EEHarold Joseph Highland: Random Bits & Bytes. Computers & Security 15(3): 184-197 (1996)
88EEHarold Joseph Highland: Random bits & bytes. Computers & Security 15(4): 270-280 (1996)
87EEHarold Joseph Highland: Random bits & bytes. Computers & Security 15(5): 356-366 (1996)
86 Harold Joseph Highland: IFIP TC 11 news. Computers & Security 15(5): 387-390 (1996)
85EEHarold Joseph Highland: Random bits & bytes. Computers & Security 15(6): 458-469 (1996)
84EEHarold Joseph Highland: Random bits & bytes. Computers & Security 15(7): 552-560 (1996)
83EEHarold Joseph Highland: Passwords, the web, and the internet. Computers & Security 15(8): 654 (1996)
82EEHarold Joseph Highland: Pornography and privacy. Computers & Security 15(8): 654-655 (1996)
81EEHarold Joseph Highland: It's a web browser! No, it's a weapon! Computers & Security 15(8): 655-656 (1996)
80EEHarold Joseph Highland: Internet/web directory. Computers & Security 15(8): 656-657 (1996)
79EEHarold Joseph Highland: The enemy within. Computers & Security 15(8): 657 (1996)
78EEHarold Joseph Highland: Ntis volumes of interest. Computers & Security 15(8): 658-660 (1996)
1995
77EEHarold Joseph Highland: Random bits & bytes. Computers & Security 14(1): 4-13 (1995)
76EEHarold Joseph Highland: Random Bits & Bytes. Computers & Security 14(2): 90-102 (1995)
75EEHarold Joseph Highland: Random bits & bytes. Computers & Security 14(3): 188-196 (1995)
74EEHarold Joseph Highland: Random bits & bytes. Computers & Security 14(4): 274-282 (1995)
73EEHarold Joseph Highland: Random bits & bytes. Computers & Security 14(5): 365-371 (1995)
72EEHarold Joseph Highland: Random bits & bytes. Computers & Security 14(6): 480-488 (1995)
71EEHarold Joseph Highland: Random bits & bytes. Computers & Security 14(7): 574-585 (1995)
70EEHarold Joseph Highland: Random bits & bytes. Computers & Security 14(8): 660-666 (1995)
1994
69 Harold Joseph Highland: Random bits & bytes. Computers & Security 13(1): 4-14 (1994)
68EEHarold Joseph Highland: Random bits & bytes. Computers & Security 13(2): 98-106 (1994)
67 Harold Joseph Highland: Random bits & bytes. Computers & Security 13(3): 192-205 (1994)
66 Harold Joseph Highland: Random bits & bytes. Computers & Security 13(4): 278-286 (1994)
65 Harold Joseph Highland: Random bits & bytes. Computers & Security 13(5): 372-378 (1994)
64 Harold Joseph Highland: Random bits & bytes. Computers & Security 13(6): 458-465 (1994)
63 Harold Joseph Highland: Random bits & bytes. Computers & Security 13(7): 540-546 (1994)
62 Harold Joseph Highland: Random bits & bytes. Computers & Security 13(8): 622-627 (1994)
1993
61 Harold Joseph Highland: A View of Information Security Tomorrow. SEC 1993: 1-11
60 Guy G. Gable, Harold Joseph Highland: Information Security in the Small Systems Context: A Framework for Understanding. SEC 1993: 37-51
59 Harold Joseph Highland: Random bits & bytes. Computers & Security 12(1): 4-14 (1993)
58EEHarold Joseph Highland: Random bits & bytes. Computers & Security 12(2): 106-116 (1993)
57 Harold Joseph Highland: Random bits & bytes. Computers & Security 12(3): 216-224 (1993)
56EEHarold Joseph Highland: Conference report. Computers & Security 12(3): 249-253 (1993)
55 Harold Joseph Highland: Random bits & bytes. Computers & Security 12(5): 424-433 (1993)
54 Harold Joseph Highland: Random bits & bytes. Computers & Security 12(6): 518-526 (1993)
53EEHarold Joseph Highland: IFIP/Sec '93 conference report. Computers & Security 12(6): 550-555 (1993)
52 Harold Joseph Highland: Random bits & bytes. Computers & Security 12(7): 612-622 (1993)
51EEHarold Joseph Highland: A view of information security tomorrow. Computers & Security 12(7): 634-639 (1993)
50EEHarold Joseph Highland: Random bits & bytes. Computers & Security 12(8): 698-709 (1993)
49EEHarold Joseph Highland: 16th national computer security conference. Computers & Security 12(8): 730-734 (1993)
1992
48 Harold Joseph Highland: Perspectives in Information Technology Security. IFIP Congress (2) 1992: 440-446
47 Harold Joseph Highland: Random bits & bytes. Computers & Security 11(1): 4-15 (1992)
46EEHarold Joseph Highland: Random bits & bytes. Computers & Security 11(2): 110-120 (1992)
45EEHarold Joseph Highland: Random bits & bytes. Computers & Security 11(3): 200-209 (1992)
44EEHarold Joseph Highland: The security impact of networks, telecommunications, and office automation. Computers & Security 11(3): 227-232 (1992)
43EEHarold Joseph Highland: Random bits & bytes. Computers & Security 11(4): 294-306 (1992)
42EEHarold Joseph Highland: Random bits & bytes. Computers & Security 11(5): 390-406 (1992)
41 Harold Joseph Highland: Random bits & bytes. Computers & Security 11(6): 498-507 (1992)
40EEHarold Joseph Highland: Random bits & bytes. Computers & Security 11(7): 592-601 (1992)
39 Harold Joseph Highland: Random bits & bytes. Computers & Security 11(8): 682-694 (1992)
1991
38 Harold Joseph Highland: Random bits & bytes. Computers & Security 10(1): 4-16 (1991)
37 Harold Joseph Highland: Random bits & bytes. Computers & Security 10(2): 92-100 (1991)
36 Harold Joseph Highland: A non-mathematical view of encryption. Computers & Security 10(3): 184-188 (1991)
35 Harold Joseph Highland: Evaluating an encryption package. Computers & Security 10(3): 189-190 (1991)
34 Harold Joseph Highland: Computers under attack. Computers & Security 10(3): 190-191 (1991)
33 Harold Joseph Highland: Microcomputer utilities. Computers & Security 10(3): 191-195 (1991)
32 Harold Joseph Highland: NTIS volumes of interest. Computers & Security 10(3): 195-198 (1991)
31EEHarold Joseph Highland: Random bits & bytes. Computers & Security 10(5): 384-397 (1991)
30 Harold Joseph Highland: Random bits & bytes. Computers & Security 10(6): 486-495 (1991)
29 Harold Joseph Highland: Random bits & bytes. Computers & Security 10(7): 586-600 (1991)
28EEHarold Joseph Highland: Random bits & bytes. Computers & Security 10(8): 690-699 (1991)
1990
27EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(1): 4-11 (1990)
26EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(2): 102-109 (1990)
25EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(3): 196-208 (1990)
24EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(4): 282-294 (1990)
23EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(5): 366-378 (1990)
22EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(6): 470-482 (1990)
21EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(7): 570-586 (1990)
20EEHarold Joseph Highland: Random bits & bytes. Computers & Security 9(8): 660-675 (1990)
1989
19EEHarold Joseph Highland: From the editor. Computers & Security 8(1): 2 (1989)
18EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(1): 3-13 (1989)
17EEHarold Joseph Highland: Reports from the victims. Computers & Security 8(2): 101 (1989)
16EEHarold Joseph Highland: From the editor. Computers & Security 8(2): 86 (1989)
15EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(2): 91-100 (1989)
14EEHarold Joseph Highland: From the editor. Computers & Security 8(3): 176-177 (1989)
13EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(3): 178-188 (1989)
12EEHarold Joseph Highland: From the editor. Computers & Security 8(4): 272-273 (1989)
11EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(4): 274-282 (1989)
10EEHarold Joseph Highland: From the editor. Computers & Security 8(5): 366-367 (1989)
9EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(5): 369-380 (1989)
8EEHarold Joseph Highland: From the editor. Computers & Security 8(6): 458-459 (1989)
7EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(6): 460-478 (1989)
6EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(7): 553-561 (1989)
5EEHarold Joseph Highland: Secret disk II - administrator. Computers & Security 8(7): 563-568 (1989)
4EEHarold Joseph Highland: From the editor. Computers & Security 8(8): 644-646 (1989)
3EEHarold Joseph Highland: Random bits & bytes. Computers & Security 8(8): 647-657 (1989)
2EEHarold Joseph Highland: Datacrime virus and new anti-virus products. Computers & Security 8(8): 659-661 (1989)
1EEHarold Joseph Highland: VCHECKER - a virus search program. Computers & Security 8(8): 669-674 (1989)

Coauthor Index

1Guy G. Gable [60]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)