1. Management of Computer Operations;Borovits,1984
2. Data Administration;Braithwaite,1985
3. Evaluation of computer security systems using a fuzzy rating language;Clements,1977
4. Auditing Advanced EDP System;Davis,1983
5. Some startling conclusions about EDI and EFT;Hill,1986