2002 |
21 | | Gerald L. Kovacich,
Andy Jones:
What InfoSec professionals should know about information warfare tactics by terrorists.
Computers & Security 21(1): 35-41 (2002) |
20 | | Gerald L. Kovacich,
Andy Jones:
What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists.
Computers & Security 21(2): 113-119 (2002) |
19 | EE | Andy Jones,
Gerald L. Kovacich,
Perry G. Luzwick:
Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1.
Information Systems Security 11(4): 9-20 (2002) |
18 | EE | Gerald L. Kovacich,
Andy Jones,
Perry G. Luzwick:
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2.
Information Systems Security 11(5): 15-23 (2002) |
2001 |
17 | | Gerald L. Kovacich:
Protecting 21st Century Information It's Time for a Change.
Computers & Security 20(3): 207-213 (2001) |
16 | | Gerald L. Kovacich:
The Corporate Information Assurance Officer (CIAO).
Computers & Security 20(4): 302-307 (2001) |
2000 |
15 | | Gerald L. Kovacich,
William C. Boni:
Internet Targets.
Computers & Security 19(2): 133-140 (2000) |
14 | | Gerald L. Kovacich:
Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care?
Computers & Security 19(4): 326-336 (2000) |
13 | | Gerald L. Kovacich:
Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon.
Computers & Security 19(5): 421-427 (2000) |
12 | | Gerald L. Kovacich:
Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why.
Computers & Security 19(6): 505-519 (2000) |
1999 |
11 | EE | Gerald L. Kovacich:
I-way robbery: Crime on the internet.
Computers & Security 18(3): 211-220 (1999) |
10 | EE | Gerald L. Kovacich:
Hackers: Freedom fighters of the 21st Century.
Computers & Security 18(7): 573-576 (1999) |
1998 |
9 | EE | Gerald L. Kovacich:
Electronic-internet business and security.
Computers & Security 17(2): 129-135 (1998) |
8 | EE | Gerald L. Kovacich:
Establishing an Information Systems Security Organization (ISSO).
Computers & Security 17(7): 600-612 (1998) |
1997 |
7 | EE | Gerald L. Kovacich:
Information warfare and the information systems security professional.
Computers & Security 16(1): 14-24 (1997) |
6 | EE | Gerald L. Kovacich:
The ISSO must understand the business and management environment.
Computers & Security 16(4): 321-326 (1997) |
5 | EE | Gerald L. Kovacich:
ISSO career development.
Computers & Security 16(6): 455-458 (1997) |
4 | EE | Gerald L. Kovacich:
Information systems security metrics management.
Computers & Security 16(7): 610-618 (1997) |
3 | EE | Gerald L. Kovacich:
How to market yourself as an ISSO.
Computers & Security 16(8): 657-662 (1997) |
1996 |
2 | EE | Gerald L. Kovacich:
Establishing a network security programme.
Computers & Security 15(6): 486-498 (1996) |
1995 |
1 | EE | Gerald L. Kovacich:
Recovering computer-generated evidence.
Computers & Security 14(4): 289-296 (1995) |