1997 | ||
---|---|---|
3 | EE | Steve Orlowski: Government initiatives in information technology security. Inf. Manag. Comput. Security 5(3): 111-118 (1997) |
1996 | ||
2 | Steve Orlowski: The Changing Face of Information Technology Security. ACISP 1996: 1-13 | |
1995 | ||
1 | Steve Orlowski: Encryption and the Gloval Information Infrastructure: An Australian Perspective. Cryptography: Policy and Algorithms 1995: 65-74 |