Search the dblp DataBase
Harold Joseph Highland :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Harold Joseph Highland Perspectives in Information Technology Security. [Citation Graph (0, 0)][DBLP ] IFIP Congress (2), 1992, pp:440-446 [Conf ] Guy G. Gable , Harold Joseph Highland Information Security in the Small Systems Context: A Framework for Understanding. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:37-51 [Conf ] Harold Joseph Highland A View of Information Security Tomorrow. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:1-11 [Conf ] Harold Joseph Highland IFIP/SEC'97 conference proceedings. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:3, pp:205- [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:4, pp:266-275 [Journal ] Harold Joseph Highland The threats on the web. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:5, pp:365-368 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:1, pp:4-16 [Journal ] Harold Joseph Highland Data encryption: A non-mathematical approach. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:5, pp:369-386 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:92-100 [Journal ] Harold Joseph Highland Historical bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:5, pp:387-411 [Journal ] Harold Joseph Highland A non-mathematical view of encryption. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:3, pp:184-188 [Journal ] Harold Joseph Highland A history of computer viruses - Introduction. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:5, pp:412-415 [Journal ] Harold Joseph Highland Evaluating an encryption package. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:3, pp:189-190 [Journal ] Harold Joseph Highland A history of computer viruses - The famous 'trio'. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:5, pp:416-429 [Journal ] Harold Joseph Highland Computers under attack. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:3, pp:190-191 [Journal ] Harold Joseph Highland A history of computer viruses: Three special viruses. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:5, pp:430-438 [Journal ] Harold Joseph Highland Microcomputer utilities. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:3, pp:191-195 [Journal ] Harold Joseph Highland Procedures to reduce the computer virus threat. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:5, pp:439-449 [Journal ] Harold Joseph Highland NTIS volumes of interest. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:3, pp:195-198 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:5, pp:384-397 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:6, pp:486-495 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:7, pp:586-600 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:8, pp:690-699 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:1, pp:4-15 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:2, pp:110-120 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:200-209 [Journal ] Harold Joseph Highland The security impact of networks, telecommunications, and office automation. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:227-232 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:4, pp:294-306 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:5, pp:390-406 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:6, pp:498-507 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:7, pp:592-601 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:8, pp:682-694 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:1, pp:4-14 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:2, pp:106-116 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:3, pp:216-224 [Journal ] Harold Joseph Highland Conference report. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:3, pp:249-253 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:5, pp:424-433 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:6, pp:518-526 [Journal ] Harold Joseph Highland IFIP/Sec '93 conference report. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:6, pp:550-555 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:7, pp:612-622 [Journal ] Harold Joseph Highland A view of information security tomorrow. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:7, pp:634-639 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:698-709 [Journal ] Harold Joseph Highland 16th national computer security conference. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:8, pp:730-734 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:1, pp:4-14 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:2, pp:98-106 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:3, pp:192-205 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:4, pp:278-286 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:5, pp:372-378 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:6, pp:458-465 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:7, pp:540-546 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:8, pp:622-627 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:1, pp:4-13 [Journal ] Harold Joseph Highland Random Bits & Bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:2, pp:90-102 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:3, pp:188-196 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:4, pp:274-282 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:5, pp:365-371 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:6, pp:480-488 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:7, pp:574-585 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:8, pp:660-666 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:1, pp:4-11 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:2, pp:90-99 [Journal ] Harold Joseph Highland Random Bits & Bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:3, pp:184-197 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:4, pp:270-280 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:5, pp:356-366 [Journal ] Harold Joseph Highland IFIP TC 11 news. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:5, pp:387-390 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:6, pp:458-469 [Journal ] Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:7, pp:552-560 [Journal ] Harold Joseph Highland Passwords, the web, and the internet. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:8, pp:654- [Journal ] Harold Joseph Highland Pornography and privacy. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:8, pp:654-655 [Journal ] Harold Joseph Highland It's a web browser! No, it's a weapon! [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:8, pp:655-656 [Journal ] Harold Joseph Highland Internet/web directory. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:8, pp:656-657 [Journal ] Harold Joseph Highland The enemy within. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:8, pp:657- [Journal ] Harold Joseph Highland Ntis volumes of interest. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:8, pp:658-660 [Journal ] Harold Joseph Highland Random bits & bytes & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:1, pp:4-13 [Journal ] Harold Joseph Highland Current literature The 19th National Information Systems Security Conference. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:1, pp:47-59 [Journal ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Reports from the victims. [Citation Graph (, )][DBLP ] Secret disk II - administrator. [Citation Graph (, )][DBLP ] From the editor. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] From the editor. [Citation Graph (, )][DBLP ] From the editor. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] From the editor. [Citation Graph (, )][DBLP ] From the editor. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Datacrime virus and new anti-virus products. [Citation Graph (, )][DBLP ] From the editor. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] VCHECKER - a virus search program. [Citation Graph (, )][DBLP ] Random bits & bytes. [Citation Graph (, )][DBLP ] From the editor. [Citation Graph (, )][DBLP ] Search in 0.062secs, Finished in 0.066secs