|
|
|
| 1997 |
| Volume 15 Issue 2,
April 1997 |
|
|
| Volume 15 Issue 1,
Jan. 1997 |
|
|
|
|
| 1996 |
| Volume 14 Issue 4,
Oct. 1996 |
Soecial issues on Issues 95: electronic commerce |
|
| Volume 14 Issue 3,
July 1996 |
|
|
| Volume 14 Issue 2,
April 1996 |
|
|
| Volume 14 Issue 1,
January 1996 |
|
|
|
|
| 1995 |
| Volume 13 Issue 4,
Oct. 1995 |
|
|
| Volume 13 Issue 3,
July 1995 |
Special issue: Issues 94 workshop on public key cryptography |
|
| Volume 13 Issue 2,
April 1995 |
|
|
| Volume 13 Issue 1,
Jan. 1995 |
Special issue on Issues '93 Workshop: part 2 |
|
|
|
| 1994 |
| Volume 12 Issue 4,
Oct. 1994 |
|
|
| Volume 12 Issue 3,
July 1994 |
|
|
| Volume 12 Issue 2,
April 1994 |
|
|
| Volume 12 Issue 1,
Jan. 1994 |
|
|
|
|
| 1993 |
| Volume 11 Issue 4,
Oct. 1993 |
|
|
| Volume 11 Issue 3,
June 1993 |
|
|
| Volume 11 Issue 2,
Spring 1993 |
|
|
| Volume 11 Issue 1,
Winter 1993 |
SIGSAC special publication: a checklist for security and contingency
planning |
|
|
|
| 1992 |
| Volume 10 Issue 4,
Fall 1992 |
|
|
| Volume 10 Issue 2-3,
Spring/Summer 1992 |
Special issue on Issues '91: data management security and privacy
standards |
|
| Volume 10 Issue 1,
Winter 1992 |
|
|
|
|
| 1991 |
| Volume 9 Issue 4,
Fall 1991 |
|
|
| Volume 9 Issue 3,
Summer 1991 |
|
|
| Volume 9 Issue 2,
Spring 1991 |
|
|
| Volume 9 Issue 1,
Winter 1991 |
|
|
|
|
| 1990 |
| Volume 8 Issue 3,
Sept. 1990 |
|
|
| Volume 8 Issue 2,
Summer 1990 |
|
|
| Volume 8 Issue 1,
April 1990 |
|
|
| Volume 7 Issue 4,
Winter 1990 |
|
|
|
|
| 1989 |
| Volume 7 Issue 3,
Fall 1989 |
|
|
| Volume 7 Issue 2,
Summer 1989 |
|
|
| Volume 7 Issue 1,
Spring 1989 |
|
|
| Volume 6 Issue 4,
Winter 1989 |
|
|
|
|
| 1988 |
| Volume 6 Issue 3,
Fall 1988 |
|
|
| Volume 6 Issue 2,
Summer 1988 |
|
|
| Volume 6 Issue 1,
April 1988 |
|
|
|
|
| 1987 |
| Volume 5 Issue 4,
Oct. 1, 1987 |
|
|
| Volume 5 Issue 3,
Summer 1987 |
|
|
| Volume 5 Issue 2,
March 1987 |
|
|
| Volume 5 Issue 1,
Winter 1987 |
|
|
|
|
| 1986 |
| Volume 4 Issue 3,
Summer 1986 |
Preposterous opinions about computer security |
|
| Volume 4 Issue 2,
Spring 1986 |
|
|
| Volume 4 Issue 1,
Winter 1986 |
|
|
|
|
| 1985 |
| Volume 3 Issue 2-4,
Fall/Winter 1985 |
Resources: part II |
|
|
|
| 1984 |
| Volume 3 Issue 1,
Spring/Summer 1984 |
Fertile topics in security, audit, and control |
|
|
|
| 1982 |
| Volume 1 Issue 4,
Fall/Winter 1982 |
Setting standards |
|
| Volume 1 Issue 3,
Summer 1982 |
|
|
| Volume 1 Issue 2,
Spring 1982 |
Courses in computer security |
|
|
|
| 1981 |
| Volume 1 Issue 1,
Winter 1981-1982 |
|