dblp.uni-trier.dewww.uni-trier.de

Gerald L. Kovacich

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2002
21 Gerald L. Kovacich, Andy Jones: What InfoSec professionals should know about information warfare tactics by terrorists. Computers & Security 21(1): 35-41 (2002)
20 Gerald L. Kovacich, Andy Jones: What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. Computers & Security 21(2): 113-119 (2002)
19EEAndy Jones, Gerald L. Kovacich, Perry G. Luzwick: Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1. Information Systems Security 11(4): 9-20 (2002)
18EEGerald L. Kovacich, Andy Jones, Perry G. Luzwick: Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2. Information Systems Security 11(5): 15-23 (2002)
2001
17 Gerald L. Kovacich: Protecting 21st Century Information It's Time for a Change. Computers & Security 20(3): 207-213 (2001)
16 Gerald L. Kovacich: The Corporate Information Assurance Officer (CIAO). Computers & Security 20(4): 302-307 (2001)
2000
15 Gerald L. Kovacich, William C. Boni: Internet Targets. Computers & Security 19(2): 133-140 (2000)
14 Gerald L. Kovacich: Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care? Computers & Security 19(4): 326-336 (2000)
13 Gerald L. Kovacich: Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon. Computers & Security 19(5): 421-427 (2000)
12 Gerald L. Kovacich: Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why. Computers & Security 19(6): 505-519 (2000)
1999
11EEGerald L. Kovacich: I-way robbery: Crime on the internet. Computers & Security 18(3): 211-220 (1999)
10EEGerald L. Kovacich: Hackers: Freedom fighters of the 21st Century. Computers & Security 18(7): 573-576 (1999)
1998
9EEGerald L. Kovacich: Electronic-internet business and security. Computers & Security 17(2): 129-135 (1998)
8EEGerald L. Kovacich: Establishing an Information Systems Security Organization (ISSO). Computers & Security 17(7): 600-612 (1998)
1997
7EEGerald L. Kovacich: Information warfare and the information systems security professional. Computers & Security 16(1): 14-24 (1997)
6EEGerald L. Kovacich: The ISSO must understand the business and management environment. Computers & Security 16(4): 321-326 (1997)
5EEGerald L. Kovacich: ISSO career development. Computers & Security 16(6): 455-458 (1997)
4EEGerald L. Kovacich: Information systems security metrics management. Computers & Security 16(7): 610-618 (1997)
3EEGerald L. Kovacich: How to market yourself as an ISSO. Computers & Security 16(8): 657-662 (1997)
1996
2EEGerald L. Kovacich: Establishing a network security programme. Computers & Security 15(6): 486-498 (1996)
1995
1EEGerald L. Kovacich: Recovering computer-generated evidence. Computers & Security 14(4): 289-296 (1995)

Coauthor Index

1William C. Boni [15]
2Andy Jones [18] [19] [20] [21]
3Perry G. Luzwick [18] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)