Journals in DBLP
Bill Hancock From the editor. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:278-279 [Journal ] Bill Hancock Security views. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:280-292 [Journal ] August Bequai Balancing legal concerns over crime and security in cyberspace. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:293-298 [Journal ] Stephen Hinde Contingency planning for the millenium. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:299-302 [Journal ] Thomas Finne A conceptual framework for information security management. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:303-307 [Journal ] Chris Pounder Further developments in the field of encryption and digital signatures. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:308-312 [Journal ] Pauline Ratnasingham EDI security: The influences of trust on EDI risks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:313-324 [Journal ] Sebastiaan H. von Solms , J. H. S. Geldenhuys Collecting security baggage on the internet. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:337-345 [Journal ] Les Labuschagne , Jan H. P. Eloff The use of real-time risk analysis to enable dynamic activation of countermeasures. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:347-357 [Journal ]