Volume 10,
Number 1,
February 1991
Volume 10,
Number 2,
April 1991
Volume 10,
Number 3,
May 1991
Volume 10,
Number 4,
June 1991
- Belden Menkus:
"Control" is fundamental to successful information security.
293-297
- Andrew Hiles:
Computer fire risks.
299-302
- Jack Bologna:
A framework for the ethical analysis of information technologies.
303-307
- Ronald Paans:
With MVS/ESA security labels towards B1.
309-324
- Paul Evans:
Computer fraud - The situation, detection and training.
325-327
- Gerald V. Post, Karen-Ann Kievit:
Accessibility vs. security: A look at the demand for computer security.
331-344
- Avi Rushinek, Sara F. Rushinek:
Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security.
345-357
- Christof Schramm:
Computing centers undermine MVS security.
359-370
Volume 10,
Number 5,
August 1991
Volume 10,
Number 6,
October 1991
Volume 10,
Number 7,
November 1991
Volume 10,
Number 8,
December 1991
Copyright © Mon Mar 15 01:12:51 2010
by Michael Ley (ley@uni-trier.de)