Information Systems Security
, Volume 10
Volume 10, Number 1, 2001
Jeffrey L. Ott
:
2001, A Professional Odyssey.
1-2
Electronic Edition
(link)
BibTeX
Ross A. Leo
:
Join ISACA in Internet Security Centre.
1-2
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Metatagging and Trademark Law: Brookfield Communications, Inc. v. West Coast Entertainment Corp.
1-5
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Information Security Standards: Deluge and Dearth.
1-6
Electronic Edition
(link)
BibTeX
James S. Tiller
:
Security of Virtual Private Networks.
1-19
Electronic Edition
(link)
BibTeX
Karl J. Flusche
:
Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough!
1-10
Electronic Edition
(link)
BibTeX
Susan Hansche
:
Information System Security Training: Making It Happen: Part 2 of 2.
1-9
Electronic Edition
(link)
BibTeX
Volume 10, Number 2, 2001
Jeffrey L. Ott
:
The State of Our Profession.
1-3
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
The Legend and Legacy of Kevin Mitnick.
1-6
Electronic Edition
(link)
BibTeX
Ben Rothke
:
The Arrival of the MSP.
1-2
Electronic Edition
(link)
BibTeX
Malcolm E. Palmer
,
Craig Robinson
,
Jody C. Patilla
,
Edward P. Moser
:
Information Security Policy Framework: Best Practices for Security Policy in the E-commerce Age.
1-15
Electronic Edition
(link)
BibTeX
Joan Wilbanks
:
Outsourcing Internet Security: The Life You Save May Be Your Company's.
1-7
Electronic Edition
(link)
BibTeX
Marie Alner
:
The Effects of Outsourcing on Information Security.
1-9
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
Building a Computer Forensics Laboratory.
1-7
Electronic Edition
(link)
BibTeX
James Trulove
:
Wired and Wireless Physical Layer Security Issues.
1-9
Electronic Edition
(link)
BibTeX
Volume 10, Number 3, 2001
Jeffrey L. Ott
:
The Dot Bombs ....
1-3
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Denial of Service to Authorized Computer Users.
1-5
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Identity Theft: Who Are You Anyway?
1-6
Electronic Edition
(link)
BibTeX
Ben Rothke
:
Doomed to Fail: The Secure Digital Music Initiative.
1-5
Electronic Edition
(link)
BibTeX
Allan R. Paliotta
:
Beyond the Maginot-Line Mentality: A Total-Process View of Information Security Risk Management.
1-30
Electronic Edition
(link)
BibTeX
Susan Hansche
:
Information System Security Training: Making it Happen, Part 2.
1-20
Electronic Edition
(link)
BibTeX
Ryan Walters
:
Top 10 Ways to Prevent Denial of Service Attacks.
1-2
Electronic Edition
(link)
BibTeX
Volume 10, Number 4, 2001
Jeffrey L. Ott
:
Managed Security Services.
1-3
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Conducting E-Business Anonymously.
1-8
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Legal Protection of Databases: Feist v. Rural Telephone Service.
1-5
Electronic Edition
(link)
BibTeX
H. Joseph Wen
,
J. Michael Tarn
:
Privacy and Security in E-Healthcare Information Management.
1-16
Electronic Edition
(link)
BibTeX
Timothy Braithwaite
:
Executives Need to Know: The Arguments to Include in a Benefits Justification for Increased Cyber Security Spending.
1-14
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
Your Computer Forensic Toolkit.
1-12
Electronic Edition
(link)
BibTeX
Volume 10, Number 5, 2001
Jeffrey L. Ott
:
The Job Market for the Information Security Professional.
1-3
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Criminalizing Tool Building.
1-5
Electronic Edition
(link)
BibTeX
Ben Rothke
:
Corporate Espionage and What Can Be Done to Prevent It.
1-7
Electronic Edition
(link)
BibTeX
Mitch Dembin
,
Erin Kenneally
:
To Disclose or Not To Disclose: A Legal Primer for ISPs.
1-12
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
Learning the Computer Forensic Way.
1-7
Electronic Edition
(link)
BibTeX
Steven Schlarman
:
The People, Policy, Technology (PPT) Model: Core Elements of the Security Process.
1-6
Electronic Edition
(link)
BibTeX
Don M. Darragh
,
Sean M. Darragh
:
On the 6th Day: A Nonprofessional's View of Information Systems Security.
1-9
Electronic Edition
(link)
BibTeX
Paul Fichtman
:
Preventing Credit Card Fraud and Identity Theft: A Primer for Online Merchants.
1-8
Electronic Edition
(link)
BibTeX
Volume 10, Number 6, 2002
Jeffrey L. Ott
:
CSI Lifetime Achievement Awards.
2-5
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Software Robots and Trespass to Chattels: eBay v. Bidder's Edge.
6-9
Electronic Edition
(link)
BibTeX
Michael J. Corby
:
Security Is All About Business, Not Technology.
10-13
Electronic Edition
(link)
BibTeX
D. G. Erwin
:
Understanding Risk.
14-17
Electronic Edition
(link)
BibTeX
Carl B. Jackson
:
The Changing Face of Continuity Planning.
18-21
Electronic Edition
(link)
BibTeX
Ray Kaplan
:
Meeting the Enemy.
22-30
Electronic Edition
(link)
BibTeX
Thomas R. Peltier
:
Remote Access Security Issues.
31-36
Electronic Edition
(link)
BibTeX
Harold F. Tipton
:
Computers at Risk - Ten Years After.
37-41
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
Forensic Methodologies: A Computer Forensic Professional's Compass!
42-49
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:47 2009 by
Michael Ley
(
ley@uni-trier.de
)