Harold Joseph Highland

According to our database1, Harold Joseph Highland authored at least 125 papers between 1973 and 1997.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1997
Procedures to reduce the computer virus threat.
Comput. Secur., 1997

A history of computer viruses: Three special viruses.
Comput. Secur., 1997

A history of computer viruses - The famous 'trio'.
Comput. Secur., 1997

A history of computer viruses - Introduction.
Comput. Secur., 1997

Historical bits & bytes.
Comput. Secur., 1997

Data encryption: A non-mathematical approach.
Comput. Secur., 1997

The threats on the web.
Comput. Secur., 1997

IFIP/SEC'97 conference proceedings.
Comput. Secur., 1997

Current literature The 19th National Information Systems Security Conference.
Comput. Secur., 1997

Random bits & bytes & bytes.
Comput. Secur., 1997

1996
The enemy within.
Comput. Secur., 1996

Internet/web directory.
Comput. Secur., 1996

It's a web browser! No, it's a weapon!
Comput. Secur., 1996

Pornography and privacy.
Comput. Secur., 1996

Passwords, the web, and the internet.
Comput. Secur., 1996

IFIP TC 11 news.
Comput. Secur., 1996

1993
16th national computer security conference.
Comput. Secur., 1993

A view of information security tomorrow.
Comput. Secur., 1993

IFIP/Sec '93 conference report.
Comput. Secur., 1993

Conference report.
Comput. Secur., 1993

Random bits & bytes.
Comput. Secur., 1993

Information Security in the Small Systems Context: A Framework for Understanding.
Proceedings of the Computer Security, 1993

1992
The security impact of networks, telecommunications, and office automation.
Comput. Secur., 1992

Perspectives in Information Technology Security.
Proceedings of the Education and Society, 1992

1991
NTIS volumes of interest.
Comput. Secur., 1991

Microcomputer utilities.
Comput. Secur., 1991

Computers under attack.
Comput. Secur., 1991

Evaluating an encryption package.
Comput. Secur., 1991

A non-mathematical view of encryption.
Comput. Secur., 1991

1990
Computer virus handbook.
Computers and security, Advanced Technology, ISBN: 978-0-946395-46-0, 1990

1989
VCHECKER - a virus search program.
Comput. Secur., 1989

Datacrime virus and new anti-virus products.
Comput. Secur., 1989

Secret disk II - administrator.
Comput. Secur., 1989

Reports from the victims.
Comput. Secur., 1989

1988
Are virus attack statistics reliable?
Comput. Secur., 1988

How to obtain a computer virus.
Comput. Secur., 1988

Report on the fourth national computer security conference: COMPSEC IV.
Comput. Secur., 1988

Star wars security or where did those micros go?
Comput. Secur., 1988

Upcoming conferences of note.
Comput. Secur., 1988

Special virus protection measures.
Comput. Secur., 1988

Blitzed by a computer virus.
Comput. Secur., 1988

Virus disaster red book.
Comput. Secur., 1988

How to test a virus filter without a virus.
Comput. Secur., 1988

Security director's dilemma.
Comput. Secur., 1988

Open Sesame-Hackers welcome.
Comput. Secur., 1988

How to combat a computer virus.
Comput. Secur., 1988

An overview of 18 virus protection products.
Comput. Secur., 1988

Anatomy of a virus attack.
Comput. Secur., 1988

Program aids for office automation security.
Comput. Secur., 1988

Secretdisk II - transparent automatic encryption.
Comput. Secur., 1988

How secure are fiber optics communications?
Comput. Secur., 1988

Product reviews.
Comput. Secur., 1988

For your information.
Comput. Secur., 1988

IFIP/Sec '88.
Comput. Secur., 1988

Electromagnetic interference.
Comput. Secur., 1988

Chernobyl computer communications.
Comput. Secur., 1988

How to protect a microcomputer system.
Comput. Secur., 1988

Computer viruses: Media hyperbole, errors and ignorance.
Comput. Secur., 1988

Virus filter evaluation.
Comput. Secur., 1988

Write-protect tab warning.
Comput. Secur., 1988

U.S. Congress computer virus report.
Comput. Secur., 1988

The brain virus: Fact and fantasy.
Comput. Secur., 1988

The anatomy of a DOS Disk.
Comput. Secur., 1988

Virus filter update.
Comput. Secur., 1988

Investigating a reported virus attack.
Comput. Secur., 1988

Tips on terrorism.
Comput. Secur., 1988

Electromagnetic eavesdropping machines for christmas?
Comput. Secur., 1988

New video terminal law.
Comput. Secur., 1988

Hackers revisited.
Comput. Secur., 1988

Encryption, attacks and ethics.
Comput. Secur., 1988

Case history of a virus attack.
Comput. Secur., 1988

1987
Data cartridge for secure data.
Comput. Secur., 1987

Computer abuse and managerial response.
Comput. Secur., 1987

New member of the International Board of Editors.
Comput. Secur., 1987

Secure fax transmission.
Comput. Secur., 1987

From the editor.
Comput. Secur., 1987

Would you report a suspected data crime to the authorities?
Comput. Secur., 1987

How to evaluate microcomputer encryption software and hardware.
Comput. Secur., 1987

Cipher cracking.
Comput. Secur., 1987

Computer security and law.
Comput. Secur., 1987

US data controls.
Comput. Secur., 1987

Encryption package.
Comput. Secur., 1987

Information sources.
Comput. Secur., 1987

Report from Beijing.
Comput. Secur., 1987

Data encryption standard II?
Comput. Secur., 1987

Random notes and reports.
Comput. Secur., 1987

The charade of computer security.
Comput. Secur., 1987

Technology watch.
Comput. Secur., 1987

Computer security: A new focus at the National Bureau of Standards.
Comput. Secur., 1987

The DES revisited - Part II.
Comput. Secur., 1987

How secure are your encryption keys?
Comput. Secur., 1987

Data physician - A virus protection program.
Comput. Secur., 1987

Random notes.
Comput. Secur., 1987

Hard disk recovery tools.
Comput. Secur., 1987

Tempest over leaking computers.
Comput. Secur., 1987

Office automation security.
Comput. Secur., 1987

Passwords revisited.
Comput. Secur., 1987

Computer viruses and sudden death!
Comput. Secur., 1987

In this issue...
Comput. Secur., 1987

1986
Electromagnetic radiation revisited, part II.
Comput. Secur., 1986

How to modify a microcomputer operating system for added security.
Comput. Secur., 1986

Electromagnetic radiation revisited.
Comput. Secur., 1986

1985
Communication regulation and international business : Juan F. Rada and G. Russell Pipe, editors Amsterdam: North-Holland, 1984. 266 + x pages, Dfl. 120.00/US $46.25.
Comput. Secur., 1985

Managing risk: A computer-aided strategy : John M. Carroll Boston: Butterworths, 1984. 277 + xvi pages, $18.95.
Comput. Secur., 1985

Kahn on codes: Secrets of the new cryptology : David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, $19.95.
Comput. Secur., 1985

U.S. computer crime legislation highlighted in special report.
Comput. Secur., 1985

Editorial : Office automation or on the value of being a dinosaur.
Comput. Secur., 1985

Microcomputer security: Data protection techniques.
Comput. Secur., 1985

Editorial.
Comput. Secur., 1985

The first national computer security conference.
Comput. Secur., 1985

1983
Impact of microcomputers on total computer security.
Comput. Secur., 1983

Advances in computer system security : Rein Turn, editor: Dedham MA: ARTECH HOUSE, Inc., 1981. vi + 403 pp. (Q.E.D. Information Sciences, PO Box 181, Wellesley, MA 02181, USA) $29.50.
Comput. Secur., 1983

Tutorial: The security of data in networks : Donald W. Davies: Silver Spring MD: IEEE Computer Society, 1981. vi + 241 pp., $20.00 to non-members and $15.00 to members of IEEE.
Comput. Secur., 1983

Codes, ciphers and computers: An introduction to information security : Bruce Bosworth: Rochelle Park NJ: Hayden Book Company, Inc., 1982. viii + 259 pp., $13.95.
Comput. Secur., 1983

CBEMA privacy and security bibliography (October 1982) : Rein Turn, editor: Washington DC: Computer and Business Equipment Manufacturers Association, 1982, iii + 51 pp.
Comput. Secur., 1983

The hut six story: Breaking the Enigma codes : Gordon Welchman: London: Allen Lane (Penguin Books, Ltd) and New York: McGraw Hill Book Co., Inc., 1982. x + 326 pp., $12.95.
Comput. Secur., 1983

1982
A guide to NBS computer security literature.
Comput. Secur., 1982

Editor's note.
Comput. Secur., 1982

Management guide to computer security : J.R. Talbot New York: John Wiley & Sons, 1981. xi + 180 pp. $29.95.
Comput. Secur., 1982

Managing information security: A program for the electronic information age : James A. Schweitzer Boston: Butterworth (Publishers), Inc., 1982. vi + 133 pp. $15.95.
Comput. Secur., 1982

1977
A Simulation Exercise.
Cryptologia, 1977

A taxonomy approach to simulation model documentation.
Proceedings of the 9th conference on Winter simulation, 1977

1974
Postscript.
Proceedings of the 7th conference on Winter simulation, 1974

1973
An integrated [two- and four- year] curriculum in information processing at a state technical college.
Proceedings of the 3rd SIGCSE Technical Symposium on Computer Science Education, 1973

Computing at the junior/community college: programs and problems.
Proceedings of the American Federation of Information Processing Societies: 1973 National Computer Conference, 1973


  Loading...