2001 | ||
---|---|---|
26 | Charles Cresson Wood: What Do The Recent Terrorist Attacks Mean For The American Information Security Profession? Computers & Security 20(8): 667-670 (2001) | |
1997 | ||
25 | EE | Charles Cresson Wood: A management view of internet electronic commerce security. Computers & Security 16(4): 316-320 (1997) |
24 | EE | Charles Cresson Wood: Part of the foundation for secure systems: separation of duties policy. Inf. Manag. Comput. Security 5(1): 18-19 (1997) |
23 | EE | Charles Cresson Wood: A secure password storage policy. Inf. Manag. Comput. Security 5(2): 79-80 (1997) |
22 | EE | Charles Cresson Wood: Securely handling staff terminations. Inf. Manag. Comput. Security 5(3): 100-101 (1997) |
1996 | ||
21 | EE | Charles Cresson Wood: Constructing difficult-to-guess passwords. Inf. Manag. Comput. Security 4(1): 43-44 (1996) |
20 | EE | Charles Cresson Wood: A computer emergency response team policy. Inf. Manag. Comput. Security 4(2): 4 (1996) |
19 | EE | Charles Cresson Wood: A policy for sending secret information over communications networks. Inf. Manag. Comput. Security 4(3): 18-19 (1996) |
18 | EE | Charles Cresson Wood: Information owners, custodians and users. Inf. Manag. Comput. Security 4(4): 34-35 (1996) |
17 | EE | Charles Cresson Wood: Removal of all unauthorized access paths in production software. Inf. Manag. Comput. Security 4(5): 22-23 (1996) |
1995 | ||
16 | EE | Charles Cresson Wood: Shifting information systems security responsibility from user organizations to vendor/publisher organizations. Computers & Security 14(4): 283-284 (1995) |
15 | EE | Charles Cresson Wood, Karen Snow: ISO 9000 and information security. Computers & Security 14(4): 287-288 (1995) |
14 | EE | Charles Cresson Wood: Writing infosec policies. Computers & Security 14(8): 667-674 (1995) |
13 | EE | Charles Cresson Wood: The Charles Cresson Wood file. Inf. Manag. Comput. Security 3(4): 23-26 (1995) |
12 | EE | Charles Cresson Wood: Background checks for employees in computer-related positions of trust. Inf. Manag. Comput. Security 3(5): 21-22 (1995) |
1994 | ||
11 | EE | Charles Cresson Wood: Fifty ways to secure dial-up connections. Computers & Security 13(3): 209-215 (1994) |
1993 | ||
10 | EE | Charles Cresson Wood, William W. Banks Jr.: Human error: an overlooked but significant information security problem. Computers & Security 12(1): 51-60 (1993) |
9 | EE | Charles Cresson Wood: Duress terminations and information security. Computers & Security 12(6): 527-535 (1993) |
8 | EE | Charles Cresson Wood: Principles of secure information systems design with groupware examples. Computers & Security 12(7): 663-678 (1993) |
7 | EE | Charles Cresson Wood: Dreams Come True with Password Genie. Inf. Manag. Comput. Security 1(5): (1993) |
1991 | ||
6 | EE | Charles Cresson Wood: Using information security to achieve competitive advantage. Computers & Security 10(5): 399-404 (1991) |
5 | EE | Charles Cresson Wood: Burning computer security, privacy, and freedom issues. Computers & Security 10(6): 524-532 (1991) |
1990 | ||
4 | EE | Charles Cresson Wood: Principles of secure information systems design. Computers & Security 9(1): 13-24 (1990) |
3 | EE | Charles Cresson Wood: How many information security staff people should you have? Computers & Security 9(5): 395-402 (1990) |
2 | EE | Charles Cresson Wood: Fifteen major forces driving the civilian information security market. Computers & Security 9(8): 677-686 (1990) |
1989 | ||
1 | EE | Charles Cresson Wood: Planning: A means to achieve data communications security. Computers & Security 8(3): 189-199 (1989) |
1 | William W. Banks Jr. | [10] |
2 | Karen Snow | [15] |