default search action
Harold Joseph Highland
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1997
- [j210]Harold Joseph Highland:
Random bits & bytes & bytes. Comput. Secur. 16(1): 4-13 (1997) - [j209]Harold Joseph Highland:
Current literature The 19th National Information Systems Security Conference. Comput. Secur. 16(1): 47-59 (1997) - [j208]Harold Joseph Highland:
IFIP/SEC'97 conference proceedings. Comput. Secur. 16(3): 205 (1997) - [j207]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 16(4): 266-275 (1997) - [j206]Harold Joseph Highland:
The threats on the web. Comput. Secur. 16(5): 365-368 (1997) - [j205]Harold Joseph Highland:
Data encryption: A non-mathematical approach. Comput. Secur. 16(5): 369-386 (1997) - [j204]Harold Joseph Highland:
Historical bits & bytes. Comput. Secur. 16(5): 387-411 (1997) - [j203]Harold Joseph Highland:
A history of computer viruses - Introduction. Comput. Secur. 16(5): 412-415 (1997) - [j202]Harold Joseph Highland:
A history of computer viruses - The famous 'trio'. Comput. Secur. 16(5): 416-429 (1997) - [j201]Harold Joseph Highland:
A history of computer viruses: Three special viruses. Comput. Secur. 16(5): 430-438 (1997) - [j200]Harold Joseph Highland:
Procedures to reduce the computer virus threat. Comput. Secur. 16(5): 439-449 (1997) - 1996
- [j199]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 15(1): 4-11 (1996) - [j198]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 15(2): 90-99 (1996) - [j197]Harold Joseph Highland:
Random Bits & Bytes. Comput. Secur. 15(3): 184-197 (1996) - [j196]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 15(4): 270-280 (1996) - [j195]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 15(5): 356-366 (1996) - [j194]Harold Joseph Highland:
IFIP TC 11 news. Comput. Secur. 15(5): 387-390 (1996) - [j193]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 15(6): 458-469 (1996) - [j192]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 15(7): 552-560 (1996) - [j191]Harold Joseph Highland:
Passwords, the web, and the internet. Comput. Secur. 15(8): 654 (1996) - [j190]Harold Joseph Highland:
Pornography and privacy. Comput. Secur. 15(8): 654-655 (1996) - [j189]Harold Joseph Highland:
It's a web browser! No, it's a weapon! Comput. Secur. 15(8): 655-656 (1996) - [j188]Harold Joseph Highland:
Internet/web directory. Comput. Secur. 15(8): 656-657 (1996) - [j187]Harold Joseph Highland:
The enemy within. Comput. Secur. 15(8): 657 (1996) - [j186]Harold Joseph Highland:
Ntis volumes of interest. Comput. Secur. 15(8): 658-660 (1996) - 1995
- [j185]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(1): 4-13 (1995) - [j184]Harold Joseph Highland:
Random Bits & Bytes. Comput. Secur. 14(2): 90-102 (1995) - [j183]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(3): 188-196 (1995) - [j182]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(4): 274-282 (1995) - [j181]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(5): 365-371 (1995) - [j180]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(6): 480-488 (1995) - [j179]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(7): 574-585 (1995) - [j178]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(8): 660-666 (1995) - 1994
- [j177]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(1): 4-14 (1994) - [j176]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(2): 98-106 (1994) - [j175]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(3): 192-205 (1994) - [j174]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(4): 278-286 (1994) - [j173]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(5): 372-378 (1994) - [j172]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(6): 458-465 (1994) - [j171]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(7): 540-546 (1994) - [j170]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 13(8): 622-627 (1994) - 1993
- [j169]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(1): 4-14 (1993) - [j168]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(2): 106-116 (1993) - [j167]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(3): 216-224 (1993) - [j166]Harold Joseph Highland:
Conference report. Comput. Secur. 12(3): 249-253 (1993) - [j165]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(5): 424-433 (1993) - [j164]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(6): 518-526 (1993) - [j163]Harold Joseph Highland:
IFIP/Sec '93 conference report. Comput. Secur. 12(6): 550-555 (1993) - [j162]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(7): 612-622 (1993) - [j161]Harold Joseph Highland:
A view of information security tomorrow. Comput. Secur. 12(7): 634-639 (1993) - [j160]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(8): 698-709 (1993) - [j159]Harold Joseph Highland:
16th national computer security conference. Comput. Secur. 12(8): 730-734 (1993) - [c7]Harold Joseph Highland:
A View of Information Security Tomorrow. SEC 1993: 1-11 - [c6]Guy G. Gable, Harold Joseph Highland:
Information Security in the Small Systems Context: A Framework for Understanding. SEC 1993: 37-51 - 1992
- [j158]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(1): 4-15 (1992) - [j157]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(2): 110-120 (1992) - [j156]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(3): 200-209 (1992) - [j155]Harold Joseph Highland:
The security impact of networks, telecommunications, and office automation. Comput. Secur. 11(3): 227-232 (1992) - [j154]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(4): 294-306 (1992) - [j153]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(5): 390-406 (1992) - [j152]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(6): 498-507 (1992) - [j151]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(7): 592-601 (1992) - [j150]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 11(8): 682-694 (1992) - [c5]Harold Joseph Highland:
Perspectives in Information Technology Security. IFIP Congress (2) 1992: 440-446 - 1991
- [j149]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(1): 4-16 (1991) - [j148]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(2): 92-100 (1991) - [j147]Harold Joseph Highland:
A non-mathematical view of encryption. Comput. Secur. 10(3): 184-188 (1991) - [j146]Harold Joseph Highland:
Evaluating an encryption package. Comput. Secur. 10(3): 189-190 (1991) - [j145]Harold Joseph Highland:
Computers under attack. Comput. Secur. 10(3): 190-191 (1991) - [j144]Harold Joseph Highland:
Microcomputer utilities. Comput. Secur. 10(3): 191-195 (1991) - [j143]Harold Joseph Highland:
NTIS volumes of interest. Comput. Secur. 10(3): 195-198 (1991) - [j142]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(5): 384-397 (1991) - [j141]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(6): 486-495 (1991) - [j140]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(7): 586-600 (1991) - [j139]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 10(8): 690-699 (1991) - 1990
- [b1]Harold Joseph Highland:
Computer virus handbook. Computers and security, Advanced Technology 1990, ISBN 978-0-946395-46-0, pp. I-XVI, 1-375 - [j138]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(1): 4-11 (1990) - [j137]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(2): 102-109 (1990) - [j136]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(3): 196-208 (1990) - [j135]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(4): 282-294 (1990) - [j134]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(5): 366-378 (1990) - [j133]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(6): 470-482 (1990) - [j132]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(7): 570-586 (1990) - [j131]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 9(8): 660-675 (1990)
1980 – 1989
- 1989
- [j130]Harold Joseph Highland:
From the editor. Comput. Secur. 8(1): 2 (1989) - [j129]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(1): 3-13 (1989) - [j128]Harold Joseph Highland:
From the editor. Comput. Secur. 8(2): 86 (1989) - [j127]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(2): 91-100 (1989) - [j126]Harold Joseph Highland:
Reports from the victims. Comput. Secur. 8(2): 101 (1989) - [j125]Harold Joseph Highland:
From the editor. Comput. Secur. 8(3): 176-177 (1989) - [j124]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(3): 178-188 (1989) - [j123]Harold Joseph Highland:
From the editor. Comput. Secur. 8(4): 272-273 (1989) - [j122]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(4): 274-282 (1989) - [j121]Harold Joseph Highland:
From the editor. Comput. Secur. 8(5): 366-367 (1989) - [j120]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(5): 369-380 (1989) - [j119]Harold Joseph Highland:
From the editor. Comput. Secur. 8(6): 458-459 (1989) - [j118]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(6): 460-478 (1989) - [j117]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(7): 553-561 (1989) - [j116]Harold Joseph Highland:
Secret disk II - administrator. Comput. Secur. 8(7): 563-568 (1989) - [j115]Harold Joseph Highland:
From the editor. Comput. Secur. 8(8): 644-646 (1989) - [j114]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 8(8): 647-657 (1989) - [j113]Harold Joseph Highland:
Datacrime virus and new anti-virus products. Comput. Secur. 8(8): 659-661 (1989) - [j112]Harold Joseph Highland:
VCHECKER - a virus search program. Comput. Secur. 8(8): 669-674 (1989) - 1988
- [j111]Harold Joseph Highland:
Case history of a virus attack. Comput. Secur. 7(1): 3-5 (1988) - [j110]Harold Joseph Highland:
Encryption, attacks and ethics. Comput. Secur. 7(1): 5-6 (1988) - [j109]Harold Joseph Highland:
How to protect a microcomputer system. Comput. Secur. 7(1): 6-7 (1988) - [j108]Harold Joseph Highland:
Chernobyl computer communications. Comput. Secur. 7(1): 7-9 (1988) - [j107]Harold Joseph Highland:
Electromagnetic interference. Comput. Secur. 7(1): 9-10 (1988) - [j106]Harold Joseph Highland:
IFIP/Sec '88. Comput. Secur. 7(1): 10 (1988) - [j105]Harold Joseph Highland:
For your information. Comput. Secur. 7(1): 10-11 (1988) - [j104]Harold Joseph Highland:
Product reviews. Comput. Secur. 7(1): 13-18 (1988) - [j103]Harold Joseph Highland:
How secure are fiber optics communications? Comput. Secur. 7(1): 25-26 (1988) - [j102]Harold Joseph Highland:
Secretdisk II - transparent automatic encryption. Comput. Secur. 7(1): 27-34 (1988) - [j101]Harold Joseph Highland:
Program aids for office automation security. Comput. Secur. 7(1): 37-43 (1988) - [j100]Harold Joseph Highland:
From the editor. Comput. Secur. 7(2): 114 (1988) - [j99]Harold Joseph Highland:
Anatomy of a virus attack. Comput. Secur. 7(2): 145-150 (1988) - [j98]Harold Joseph Highland:
An overview of 18 virus protection products. Comput. Secur. 7(2): 157-161 (1988) - [j97]Harold Joseph Highland:
How to combat a computer virus. Comput. Secur. 7(2): 157 (1988) - [j96]Harold Joseph Highland:
From the editor. Comput. Secur. 7(3): 228 (1988) - [j95]Harold Joseph Highland:
Open Sesame-Hackers welcome. Comput. Secur. 7(3): 232-233 (1988) - [j94]Harold Joseph Highland:
Security director's dilemma. Comput. Secur. 7(3): 233-235 (1988) - [j93]Harold Joseph Highland:
How to test a virus filter without a virus. Comput. Secur. 7(3): 235-237 (1988) - [j92]Harold Joseph Highland:
Virus disaster red book. Comput. Secur. 7(3): 237 (1988) - [j91]Harold Joseph Highland:
Blitzed by a computer virus. Comput. Secur. 7(3): 237-239 (1988) - [j90]Harold Joseph Highland:
Special virus protection measures. Comput. Secur. 7(3): 239-242 (1988) - [j89]Harold Joseph Highland:
Upcoming conferences of note. Comput. Secur. 7(3): 242-243 (1988) - [j88]Harold Joseph Highland:
Star wars security or where did those micros go? Comput. Secur. 7(3): 243-244 (1988) - [j87]Harold Joseph Highland:
Report on the fourth national computer security conference: COMPSEC IV. Comput. Secur. 7(3): 309-311 (1988) - [j86]Harold Joseph Highland:
From the editor. Comput. Secur. 7(4): 334 (1988) - [j85]Harold Joseph Highland:
How to obtain a computer virus. Comput. Secur. 7(4): 337 (1988) - [j84]Harold Joseph Highland:
Are virus attack statistics reliable? Comput. Secur. 7(4): 338 (1988) - [j83]Harold Joseph Highland:
Hackers revisited. Comput. Secur. 7(4): 339 (1988) - [j82]Harold Joseph Highland:
New video terminal law. Comput. Secur. 7(4): 340 (1988) - [j81]Harold Joseph Highland:
Electromagnetic eavesdropping machines for christmas? Comput. Secur. 7(4): 341 (1988) - [j80]Harold Joseph Highland:
Tips on terrorism. Comput. Secur. 7(4): 344 (1988) - [j79]Harold Joseph Highland:
Investigating a reported virus attack. Comput. Secur. 7(4): 344-345 (1988) - [j78]Harold Joseph Highland:
Virus filter update. Comput. Secur. 7(4): 345 (1988) - [j77]Harold Joseph Highland:
The anatomy of a DOS Disk. Comput. Secur. 7(4): 357-360 (1988) - [j76]Harold Joseph Highland:
The brain virus: Fact and fantasy. Comput. Secur. 7(4): 367-370 (1988) - [j75]Harold Joseph Highland:
From the editor. Comput. Secur. 7(5): 438 (1988) - [j74]Harold Joseph Highland:
U.S. Congress computer virus report. Comput. Secur. 7(5): 439 (1988) - [j73]Harold Joseph Highland:
Write-protect tab warning. Comput. Secur. 7(5): 439 (1988) - [j72]Harold Joseph Highland:
Virus filter evaluation. Comput. Secur. 7(5): 440 (1988) - [j71]Harold Joseph Highland:
Virus filter update. Comput. Secur. 7(5): 441-442 (1988) - [j70]Harold Joseph Highland:
Computer viruses: Media hyperbole, errors and ignorance. Comput. Secur. 7(5): 442-450 (1988) - [j69]Harold Joseph Highland:
From the editor. Comput. Secur. 7(6): 532 (1988) - [j68]Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 7(6): 533-541 (1988) - 1987
- [j67]Harold Joseph Highland:
In this issue... Comput. Secur. 6(1): 1-3 (1987) - [j66]Harold Joseph Highland:
Computer viruses and sudden death! Comput. Secur. 6(1): 8-10 (1987) - [j65]Harold Joseph Highland:
Data physician - A virus protection program. Comput. Secur. 6(1): 73-79 (1987) - [j64]Harold Joseph Highland:
In this issue... Comput. Secur. 6(2): 97-98 (1987) - [j63]Harold Joseph Highland:
How secure are your encryption keys? Comput. Secur. 6(2): 99-100 (1987) - [j62]Harold Joseph Highland:
The DES revisited - Part II. Comput. Secur. 6(2): 100-101 (1987) - [j61]Harold Joseph Highland:
Computer security: A new focus at the National Bureau of Standards. Comput. Secur. 6(2): 102-103 (1987) - [j60]Harold Joseph Highland:
Technology watch. Comput. Secur. 6(2): 103-108 (1987) - [j59]Harold Joseph Highland:
The charade of computer security. Comput. Secur. 6(2): 108-109 (1987) - [j58]Harold Joseph Highland:
Random notes and reports. Comput. Secur. 6(2): 109-110 (1987) - [j57]Harold Joseph Highland:
From the editor. Comput. Secur. 6(3): 193-194 (1987) - [j56]Harold Joseph Highland:
Data encryption standard II? Comput. Secur. 6(3): 195-196 (1987) - [j55]Harold Joseph Highland:
Report from Beijing. Comput. Secur. 6(3): 196-198 (1987) - [j54]Harold Joseph Highland:
Information sources. Comput. Secur. 6(3): 198-199 (1987) - [j53]Harold Joseph Highland:
Encryption package. Comput. Secur. 6(3): 199-202 (1987) - [j52]Harold Joseph Highland:
US data controls. Comput. Secur. 6(3): 202-203 (1987) - [j51]Harold Joseph Highland:
Computer security and law. Comput. Secur. 6(3): 203-205 (1987) - [j50]Harold Joseph Highland:
Cipher cracking. Comput. Secur. 6(3): 205 (1987) - [j49]Harold Joseph Highland:
How to evaluate microcomputer encryption software and hardware. Comput. Secur. 6(3): 229-244 (1987) - [j48]Harold Joseph Highland:
From the editor... Comput. Secur. 6(4): 285-287 (1987) - [j47]Harold Joseph Highland:
Would you report a suspected data crime to the authorities? Comput. Secur. 6(4): 288-295 (1987) - [j46]Harold Joseph Highland:
From the editor. Comput. Secur. 6(5): 365-367 (1987) - [j45]Harold Joseph Highland:
Secure fax transmission. Comput. Secur. 6(5): 368-370 (1987) - [j44]Harold Joseph Highland:
From the editor. Comput. Secur. 6(6): 445-446 (1987) - [j43]Harold Joseph Highland:
New member of the International Board of Editors. Comput. Secur. 6(6): 447 (1987) - [j42]Harold Joseph Highland:
Computer abuse and managerial response. Comput. Secur. 6(6): 448 (1987) - [j41]Harold Joseph Highland:
Data cartridge for secure data. Comput. Secur. 6(6): 449-451 (1987) - [j40]Harold Joseph Highland:
Passwords revisited. Comput. Secur. 6(6): 451-452 (1987) - [j39]Harold Joseph Highland:
Office automation security. Comput. Secur. 6(6): 452-457 (1987) - [j38]Harold Joseph Highland:
Tempest over leaking computers. Comput. Secur. 6(6): 457-458 (1987) - [j37]Harold Joseph Highland:
Hard disk recovery tools. Comput. Secur. 6(6): 458-462 (1987) - [j36]Harold Joseph Highland:
Random notes. Comput. Secur. 6(6): 463 (1987) - 1986
- [j35]Harold Joseph Highland:
In this issue... Comput. Secur. 5(1): 1 (1986) - [j34]Harold Joseph Highland:
In this issue... Comput. Secur. 5(2): 83 (1986) - [j33]Harold Joseph Highland:
Electromagnetic radiation revisited. Comput. Secur. 5(2): 85-93 (1986) - [j32]Harold Joseph Highland:
In this issue ... Comput. Secur. 5(3): 179-180 (1986) - [j31]Harold Joseph Highland, Viiveke Fåk:
Electromagnetic radiation revisited, part II. Comput. Secur. 5(3): 181-184 (1986) - [j30]Harold Joseph Highland:
In this issue ... Comput. Secur. 5(4): 277-278 (1986) - [j29]Harold Joseph Highland:
How to modify a microcomputer operating system for added security. Comput. Secur. 5(4): 340-343 (1986) - 1985
- [j28]Harold Joseph Highland:
Editorial. Comput. Secur. 4(1): 1-2 (1985) - [j27]Harold Joseph Highland:
The first national computer security conference. Comput. Secur. 4(1): 65-73 (1985) - [j26]Harold Joseph Highland:
Editorial. Comput. Secur. 4(2): 101-102 (1985) - [j25]Harold Joseph Highland:
Microcomputer security: Data protection techniques. Comput. Secur. 4(2): 123-134 (1985) - [j24]Harold Joseph Highland:
Editorial : Office automation or on the value of being a dinosaur. Comput. Secur. 4(3): 185-186 (1985) - [j23]Harold Joseph Highland:
U.S. computer crime legislation highlighted in special report. Comput. Secur. 4(3): 245-246 (1985) - [j22]Harold Joseph Highland:
Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, $19.95. Comput. Secur. 4(3): 247 (1985) - [j21]Harold Joseph Highland:
Managing risk: A computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, $18.95. Comput. Secur. 4(3): 247-248 (1985) - [j20]Harold Joseph Highland:
Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US $46.25. Comput. Secur. 4(3): 249 (1985) - [j19]Harold Joseph Highland:
Editorial. Comput. Secur. 4(4): 267-268 (1985) - 1984
- [j18]Harold Joseph Highland:
Editorial. Comput. Secur. 3(2): 77-79 (1984) - [j17]Harold Joseph Highland:
Editorial. Comput. Secur. 3(3): 169-170 (1984) - [j16]Harold Joseph Highland:
Editorial. Comput. Secur. 3(4): 257 (1984) - 1983
- [j15]Harold Joseph Highland:
Editorial. Comput. Secur. 2(1): 1-2 (1983) - [j14]Harold Joseph Highland:
The hut six story: Breaking the Enigma codes : Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. x + 326 pp., $12.95. Comput. Secur. 2(1): 82-83 (1983) - [j13]Harold Joseph Highland:
CBEMA privacy and security bibliography (October 1982) : Rein Turn, editor: Washington DC: Computer and Business Equipment Manufacturers Association, 1982, iii + 51 pp. Comput. Secur. 2(1): 83 (1983) - [j12]Harold Joseph Highland:
Codes, ciphers and computers: An introduction to information security : Bruce Bosworth: Rochelle Park NJ: Hayden Book Company, Inc., 1982. viii + 259 pp., $13.95. Comput. Secur. 2(1): 83-84 (1983) - [j11]Harold Joseph Highland:
Tutorial: The security of data in networks : Donald W. Davies: Silver Spring MD: IEEE Computer Society, 1981. vi + 241 pp., $20.00 to non-members and $15.00 to members of IEEE. Comput. Secur. 2(1): 84 (1983) - [j10]Harold Joseph Highland:
Advances in computer system security : Rein Turn, editor: Dedham MA: ARTECH HOUSE, Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences, PO Box 181, Wellesley, MA 02181, USA) $29.50. Comput. Secur. 2(1): 84 (1983) - [j9]Harold Joseph Highland:
Impact of microcomputers on total computer security. Comput. Secur. 2(2): 171-183 (1983) - [j8]Harold Joseph Highland:
Editorial. Comput. Secur. 2(3): 213 (1983) - 1982
- [j7]Harold Joseph Highland:
Editorial. Comput. Secur. 1(1): 1-2 (1982) - [j6]Harold Joseph Highland:
Editorial. Comput. Secur. 1(2): 95 (1982) - [j5]Esther Harris Highland, Harold Joseph Highland:
A guide to NBS computer security literature. Comput. Secur. 1(2): 164-176 (1982) - [j4]Harold Joseph Highland:
Managing information security: A program for the electronic information age : James A. Schweitzer Boston: Butterworth (Publishers), Inc., 1982. vi + 133 pp. $15.95. Comput. Secur. 1(2): 191 (1982) - [j3]Harold Joseph Highland:
Management guide to computer security : J.R. Talbot New York: John Wiley & Sons, 1981. xi + 180 pp. $29.95. Comput. Secur. 1(2): 191-192 (1982) - [j2]Harold Joseph Highland:
Editor's note. Comput. Secur. 1(3): 242 (1982) - 1981
- [e10]Mitchell G. Spiegel, John E. Gaffney Jr., Harold Joseph Highland:
Proceedings of the 1981 ACM workshop/symposium on Measurement and evaluation of software quality, USA, 1981. ACM 1981, ISBN 978-0-89791-038-5 [contents]
1970 – 1979
- 1979
- [e9]Harold Joseph Highland, Mitchell G. Spiegel, Robert E. Shannon:
Proceedings of the 11th conference on Winter simulation, WSC 1979, San Diego, CA, USA, December 3-5, 1979. ACM 1979 [contents] - 1978
- [e8]Harold Joseph Highland, Norman R. Nielsen, Larry G. Hull:
Proceedings of the 10th conference on Winter simulation, WSC 1978, Miami Beach, FL, USA, December 4-6, 1978. ACM 1978 [contents] - 1977
- [j1]Harold Joseph Highland:
A Simulation Exercise. Cryptologia 1(4): 376-377 (1977) - [c4]Harold Joseph Highland:
A taxonomy approach to simulation model documentation. WSC 1977: 724-729 - [e7]Harold Joseph Highland, Robert G. Sargent, J. William Schmidt, Mitchell G. Spiegel, Paul F. Roth, Sara Torrence, Claude M. Delfosse, Larry G. Hull:
Proceedings of the 9th conference on Winter simulation, WSC 1977, Gaithersburg, MD, USA, December 5-7, 1977. ACM 1977 [contents] - 1976
- [e6]Larry G. Hull, Arthur Chantker, Gary J. Nutt, William R. Franta, Harold Joseph Highland:
Proceedings of the 4th Symposium on Simulation of Computer Systems, ANSS 1976, Boulder, Colorado, USA, August 10-12, 1976. IEEE 1976 [contents] - [e5]Harold Joseph Highland, Thomas J. Schriber, Robert G. Sargent, Larry G. Hull, Sara Torrence, Herbert Maisel, Paul F. Roth:
Proceedings of the 76 Bicentennial conference on Winter simulation, WSC 1976, Gaithersburg, MD, USA, December 6-8, 1976. ACM 1976 [contents] - 1975
- [e4]Larry G. Hull, Paul F. Roth, Susan L. Solomon, Richard B. Ensign, Harold Joseph Highland:
Proceedings of the 3rd Symposium on Simulation of Computer Systems, ANSS 1975, Boulder, Colorado, USA, August 12-14, 1975. IEEE 1975 [contents] - 1974
- [c3]Harold Joseph Highland:
Postscript. WSC 1974: 831-839 - [e3]Harold Joseph Highland, Paul F. Roth, Philip J. Kiviat, John W. McCredie:
Proceedings of the 2nd Symposium on Simulation of Computer Systems, ANSS 1974, Gaithersburg, Maryland, USA, June 4-6, 1974. IEEE 1974 [contents] - [e2]Harold Joseph Highland, Michael F. Morris, Harold Steinberg, Donald O. Walter, Fred Silver, Susan L. Solomon, Joseph Annino, Dennis M. Gilbert:
Proceedings of the 7th conference on Winter simulation, WSC 1974, Washington, DC, USA, January 14-16, 1974. ACM 1974, ISBN 978-1-4503-7401-9 [contents] - 1973
- [c2]Harold Joseph Highland:
Computing at the junior/community college: programs and problems. AFIPS National Computer Conference 1973: 367-369 - [c1]Harold Joseph Highland, Charles B. Thompson:
An integrated [two- and four- year] curriculum in information processing at a state technical college. SIGCSE 1973: 86-90 - [e1]Michael F. Morris, Paul F. Roth, Philip J. Kiviat, Harold Joseph Highland:
Proceedings of the 1st Symposium on Simulation of Computer Systems, ANSS 1973, Gaithersburg, Maryland, USA, June 19-20, 1973. IEEE 1973 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint