1994 | ||
---|---|---|
19 | EE | Belden Menkus: The new importance of "business continuity" in data processing disaster recovery planning. Computers & Security 13(2): 115-118 (1994) |
1992 | ||
18 | EE | Belden Menkus: A high rise building fire case study. Computers & Security 11(1): 19-23 (1992) |
17 | EE | Belden Menkus: Introduction to computer security. Computers & Security 11(2): 121-127 (1992) |
16 | EE | Belden Menkus: Concerns in computer security. Computers & Security 11(3): 211-215 (1992) |
15 | EE | Belden Menkus: The lessons of the Great Chicago flood of 1992. Computers & Security 11(5): 417-420 (1992) |
14 | EE | Belden Menkus: Understanding EDI security issues. Computers & Security 11(6): 525-528 (1992) |
13 | Belden Menkus: Re-examining the Data Encryption Standard. Computers & Security 11(8): 703-706 (1992) | |
1991 | ||
12 | EE | Belden Menkus: How to begin dealing with computer security. Computers & Security 10(3): 199-203 (1991) |
11 | EE | Belden Menkus: "Control" is fundamental to successful information security. Computers & Security 10(4): 293-297 (1991) |
10 | EE | Belden Menkus: "Hackers": Know the adversary. Computers & Security 10(5): 405-409 (1991) |
1990 | ||
9 | EE | Belden Menkus: How an "audit trail" aids in maintaining information integrity...as illustrated in retailing. Computers & Security 9(2): 111-116 (1990) |
8 | EE | Belden Menkus: Understanding data communication security vulnerabilities. Computers & Security 9(3): 209-213 (1990) |
7 | EE | Belden Menkus: Why data communications are insecure. Computers & Security 9(6): 483-487 (1990) |
6 | EE | Belden Menkus: The complexity of "long haul" data communication security. Computers & Security 9(7): 587-592 (1990) |
1989 | ||
5 | EE | Belden Menkus: The computer virus situation is not encouraging. Computers & Security 8(2): 115-119 (1989) |
4 | EE | Belden Menkus: Physical security: Selecting an access control system. Computers & Security 8(3): 201-205 (1989) |
3 | EE | Belden Menkus: It's time to rethink data processing fire protection. Computers & Security 8(5): 389-394 (1989) |
2 | EE | Belden Menkus: The employee's role in protecting information assets. Computers & Security 8(6): 487-492 (1989) |
1 | EE | Belden Menkus: Computer-related fire problems revisited. Computers & Security 8(7): 581-586 (1989) |