Charles Cresson Wood

According to our database1, Charles Cresson Wood authored at least 39 papers between 1982 and 2001.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2001
What Do The Recent Terrorist Attacks Mean For The American Information Security Profession?
Comput. Secur., 2001

1997
Securely handling staff terminations.
Inf. Manag. Comput. Secur., 1997

A secure password storage policy.
Inf. Manag. Comput. Secur., 1997

Part of the foundation for secure systems: separation of duties policy.
Inf. Manag. Comput. Secur., 1997

A management view of internet electronic commerce security.
Comput. Secur., 1997

1996
Removal of all unauthorized access paths in production software.
Inf. Manag. Comput. Secur., 1996

Information owners, custodians and users.
Inf. Manag. Comput. Secur., 1996

A policy for sending secret information over communications networks.
Inf. Manag. Comput. Secur., 1996

A computer emergency response team policy.
Inf. Manag. Comput. Secur., 1996

Constructing difficult-to-guess passwords.
Inf. Manag. Comput. Secur., 1996

1995
Background checks for employees in computer-related positions of trust.
Inf. Manag. Comput. Secur., 1995

The Charles Cresson Wood file.
Inf. Manag. Comput. Secur., 1995

ISO 9000 and information security.
Comput. Secur., 1995

Writing infosec policies.
Comput. Secur., 1995

Shifting information systems security responsibility from user organizations to vendor/publisher organizations.
Comput. Secur., 1995

1994
Fifty ways to secure dial-up connections.
Comput. Secur., 1994

1993
Dreams Come True with Password Genie.
Inf. Manag. Comput. Secur., 1993

Human error: an overlooked but significant information security problem.
Comput. Secur., 1993

Principles of secure information systems design with groupware examples.
Comput. Secur., 1993

Duress terminations and information security.
Comput. Secur., 1993

1991
Burning computer security, privacy, and freedom issues.
Comput. Secur., 1991

Using information security to achieve competitive advantage.
Comput. Secur., 1991

1990
Fifteen major forces driving the civilian information security market.
Comput. Secur., 1990

How many information security staff people should you have?
Comput. Secur., 1990

Principles of secure information systems design.
Comput. Secur., 1990

1989
Planning: A means to achieve data communications security.
Comput. Secur., 1989

1988
A context for information systems security planning.
Comput. Secur., 1988

1987
The human immune system as an information systems security reference model.
Comput. Secur., 1987

Information systems security: Management success factors.
Comput. Secur., 1987

1986
Security modules: Potent information security system components.
Comput. Secur., 1986

Establishing internal technical systems security standards.
Comput. Secur., 1986

Establishing technical systems security standards at a large multinational bank.
Comput. Secur., 1986

1985
Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50.
Comput. Secur., 1985

Floppy diskette security measures.
Comput. Secur., 1985

1984
Securicom '84.
Comput. Secur., 1984

1983
Enhancing information security with the information resource management approach.
Comput. Secur., 1983

Effective information system security with password controls.
Comput. Secur., 1983

1982
Policies for deterring computer abuse.
Comput. Secur., 1982

Future applications of cryptography.
Comput. Secur., 1982


  Loading...