1. Computer Security: Part I, Data Management;Brandt,1972
2. How Safe is Your System;Melvin;Data Systems,1971
3. Computational Algorithms for Closed Queuing Networks with Exponential Servers;Buzen;Comm. ACM,1973
4. Experiments in Communication Networks;Gady;Naval Res. Logist. Quarterly,1974
5. Protecting Valuable Data: Part I;Canning;EDP Analyzer,1974