Journals in DBLP
Catherine Ko , Margaret A. Hurley Managing end-user computing. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1995, v:3, n:3, pp:3-6 [Journal ] Barry Moule , Lina Giavara Policies, procedures and standards: an approach for implementation. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1995, v:3, n:3, pp:7-16 [Journal ] Russell Smith Business continuity planning and service level agreements. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1995, v:3, n:3, pp:17-19 [Journal ] Kevin J. Fitzgerald Establishing an effective continuity strategy. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1995, v:3, n:3, pp:20-24 [Journal ] Thornton May The interpersonal computer interregnum. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1995, v:3, n:3, pp:25-33 [Journal ]