Information Management & Computer Security
, Volume 3
Volume 3, Number 1, 1995
Martin Whybrow
:
Bridging the gaps.
4-6
Electronic Edition
(link)
BibTeX
Elaine Irwin
:
Software Intelligence introduces a new cross-platform, dient/server security solution.
7-8
Electronic Edition
(link)
BibTeX
T. J. Paradine
:
Business interruption insurance: a vital ingredient in your disaster recovery plan.
9-17
Electronic Edition
(link)
BibTeX
Jay Bloombecker
:
Simplifying the state and federal computer crime law maze in the USA.
18-20
Electronic Edition
(link)
BibTeX
Bruce Edwards
,
John Cooper
:
Testing the disaster recovery plan.
21-27
Electronic Edition
(link)
BibTeX
John R. Campbell
:
Real security for local area networks.
28-29
Electronic Edition
(link)
BibTeX
Richard Cardinali
:
Safeguarding databases: basic concepts revisited.
30-37
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
What if you had a flood in your computer room.
38-40
Electronic Edition
(link)
BibTeX
Graham Collier
:
Information privacy.
41-45
Electronic Edition
(link)
BibTeX
Volume 3, Number 2, 1995
Richard G. Mathieu
,
Robert L. Woodard
:
Data integrity and the Internet: implications for management.
3-7
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
Information security baselines.
8-12
Electronic Edition
(link)
BibTeX
Matthew K. O. Lee
:
Legal control of computer crime in Hong Kong.
13-19
Electronic Edition
(link)
BibTeX
Phil Spurling
:
Promoting security awareness and commitment.
20-26
Electronic Edition
(link)
BibTeX
Snehamay Banerjee
,
Damodar Y. Golhar
:
Security issues in the EDI environment.
27-33
Electronic Edition
(link)
BibTeX
Mahmoud M. Yasin
,
John V. Quigley
:
The utility of information systems views of CEOs and information system executives.
34-38
Electronic Edition
(link)
BibTeX
Volume 3, Number 3, 1995
Catherine Ko
,
Margaret A. Hurley
:
Managing end-user computing.
3-6
Electronic Edition
(link)
BibTeX
Barry Moule
,
Lina Giavara
:
Policies, procedures and standards: an approach for implementation.
7-16
Electronic Edition
(link)
BibTeX
Russell Smith
:
Business continuity planning and service level agreements.
17-19
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
Establishing an effective continuity strategy.
20-24
Electronic Edition
(link)
BibTeX
Thornton May
:
The interpersonal computer interregnum.
25-33
Electronic Edition
(link)
BibTeX
Volume 3, Number 4, 1995
Gregory R. Doddrell
:
Security environment reviews.
3-14
Electronic Edition
(link)
BibTeX
Gregory R. Doddrell
:
Information security and the Internet.
15-19
Electronic Edition
(link)
BibTeX
Barry Gubbins
:
Protecting availability in complex computer environments.
20-22
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
The Charles Cresson Wood file.
23-26
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
Security and data integrity for LANs and WANs.
27-33
Electronic Edition
(link)
BibTeX
Volume 3, Number 5, 1995
Richard L. Nolan
:
Improving IT quality: the basics to boost service and cut costs.
3-7
Electronic Edition
(link)
BibTeX
Maaikel Klein Klouwenberg
,
William J. D. Koo
,
J. Alphons M. van Schaik
:
Establishing business strategy with information technology.
8-20
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
Background checks for employees in computer-related positions of trust.
21-22
Electronic Edition
(link)
BibTeX
Thornton May
:
Chief information officer ABCs.
23-24
Electronic Edition
(link)
BibTeX
David Zerman
:
Crisis communication: managing the mass media.
25-28
Electronic Edition
(link)
BibTeX
David P. Norton
:
Managing benefits from information technology.
29-35
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:03:33 2009 by
Michael Ley
(
ley@uni-trier.de
)