dblp.uni-trier.dewww.uni-trier.de

Charles Cresson Wood

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2001
26 Charles Cresson Wood: What Do The Recent Terrorist Attacks Mean For The American Information Security Profession? Computers & Security 20(8): 667-670 (2001)
1997
25EECharles Cresson Wood: A management view of internet electronic commerce security. Computers & Security 16(4): 316-320 (1997)
24EECharles Cresson Wood: Part of the foundation for secure systems: separation of duties policy. Inf. Manag. Comput. Security 5(1): 18-19 (1997)
23EECharles Cresson Wood: A secure password storage policy. Inf. Manag. Comput. Security 5(2): 79-80 (1997)
22EECharles Cresson Wood: Securely handling staff terminations. Inf. Manag. Comput. Security 5(3): 100-101 (1997)
1996
21EECharles Cresson Wood: Constructing difficult-to-guess passwords. Inf. Manag. Comput. Security 4(1): 43-44 (1996)
20EECharles Cresson Wood: A computer emergency response team policy. Inf. Manag. Comput. Security 4(2): 4 (1996)
19EECharles Cresson Wood: A policy for sending secret information over communications networks. Inf. Manag. Comput. Security 4(3): 18-19 (1996)
18EECharles Cresson Wood: Information owners, custodians and users. Inf. Manag. Comput. Security 4(4): 34-35 (1996)
17EECharles Cresson Wood: Removal of all unauthorized access paths in production software. Inf. Manag. Comput. Security 4(5): 22-23 (1996)
1995
16EECharles Cresson Wood: Shifting information systems security responsibility from user organizations to vendor/publisher organizations. Computers & Security 14(4): 283-284 (1995)
15EECharles Cresson Wood, Karen Snow: ISO 9000 and information security. Computers & Security 14(4): 287-288 (1995)
14EECharles Cresson Wood: Writing infosec policies. Computers & Security 14(8): 667-674 (1995)
13EECharles Cresson Wood: The Charles Cresson Wood file. Inf. Manag. Comput. Security 3(4): 23-26 (1995)
12EECharles Cresson Wood: Background checks for employees in computer-related positions of trust. Inf. Manag. Comput. Security 3(5): 21-22 (1995)
1994
11EECharles Cresson Wood: Fifty ways to secure dial-up connections. Computers & Security 13(3): 209-215 (1994)
1993
10EECharles Cresson Wood, William W. Banks Jr.: Human error: an overlooked but significant information security problem. Computers & Security 12(1): 51-60 (1993)
9EECharles Cresson Wood: Duress terminations and information security. Computers & Security 12(6): 527-535 (1993)
8EECharles Cresson Wood: Principles of secure information systems design with groupware examples. Computers & Security 12(7): 663-678 (1993)
7EECharles Cresson Wood: Dreams Come True with Password Genie. Inf. Manag. Comput. Security 1(5): (1993)
1991
6EECharles Cresson Wood: Using information security to achieve competitive advantage. Computers & Security 10(5): 399-404 (1991)
5EECharles Cresson Wood: Burning computer security, privacy, and freedom issues. Computers & Security 10(6): 524-532 (1991)
1990
4EECharles Cresson Wood: Principles of secure information systems design. Computers & Security 9(1): 13-24 (1990)
3EECharles Cresson Wood: How many information security staff people should you have? Computers & Security 9(5): 395-402 (1990)
2EECharles Cresson Wood: Fifteen major forces driving the civilian information security market. Computers & Security 9(8): 677-686 (1990)
1989
1EECharles Cresson Wood: Planning: A means to achieve data communications security. Computers & Security 8(3): 189-199 (1989)

Coauthor Index

1William W. Banks Jr. [10]
2Karen Snow [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)