Information Systems Security
, Volume 11
Volume 11, Number 1, 2002
Jeffrey L. Ott
:
The Dot. Gones and Beyond.
2-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Third-Party Liability: Who Pays for Computer Damages?
5-9
Electronic Edition
(link)
BibTeX
Thomas J. Bray
:
Security Actions During Reduction in Workforce Efforts: What To Do When Downsizing.
11-15
Electronic Edition
(link)
BibTeX
Bob Forbes
:
The 5
th
Factor: Behavior Profiling Opens New Possibilities for Web Access Control.
16-22
Electronic Edition
(link)
BibTeX
William L. Kuechler Jr.
,
Fritz H. Grupe
:
Digital Signatures: A Business View.
23-35
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
Forensic Fieldwork: Experience Is the Best Teacher.
36-43
Electronic Edition
(link)
BibTeX
Steven Schlarman
:
The Case for a Security Information System.
44-50
Electronic Edition
(link)
BibTeX
Bob Worner
:
Choosing the Right Security Infrastructure for E-Business Success.
51-56
Electronic Edition
(link)
BibTeX
Volume 11, Number 2, 2002
Jeffrey L. Ott
:
Be Prepared.
2-3
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act.
4-8
Electronic Edition
(link)
BibTeX
Michael J. Corby
:
The Case for Privacy.
9-14
Electronic Edition
(link)
BibTeX
Mark A. Rush
,
Lucas G. Paglia
:
Balancing Privacy, Public Safety, and Network Security Concerns after September 11.
15-24
Electronic Edition
(link)
BibTeX
Leslie D. Ball
:
CIO on Center Stage: September 11 Changes Everything.
25-29
Electronic Edition
(link)
BibTeX
Alan Berman
:
Lessons Learned: The Aftermath of September 11.
30-37
Electronic Edition
(link)
BibTeX
K. Narayanaswamy
:
ISPs and Denial of Service Attacks.
38-46
Electronic Edition
(link)
BibTeX
Daniel Mouly
:
Strong User Authentication.
47-53
Electronic Edition
(link)
BibTeX
Volume 11, Number 3, 2002
Jeffrey L. Ott
:
We Are One, We Are Borg.
2-3
Electronic Edition
(link)
BibTeX
Robert Rosenbaum
:
The Future of Wireless Communications.
4-13
Electronic Edition
(link)
BibTeX
Andres Llana Jr.
:
Wireless Application Protocol (WAP) and Mobile Wireless Access.
14-21
Electronic Edition
(link)
BibTeX
Gilbert Held
:
Overcoming Wireless LAN Security Vulnerabilities.
22-27
Electronic Edition
(link)
BibTeX
Mandy Andress
:
Wireless LAN Security.
29-33
Electronic Edition
(link)
BibTeX
Dennis Seymour Lee
:
Wireless Internet Security.
34-50
Electronic Edition
(link)
BibTeX
Volume 11, Number 4, 2002
Jeffrey L. Ott
:
Everything Has Changed, But It Is All the Same.
2-3
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
The Digital Millennium Copyright Act.
4-8
Electronic Edition
(link)
BibTeX
Andy Jones
,
Gerald L. Kovacich
,
Perry G. Luzwick
:
Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1.
9-20
Electronic Edition
(link)
BibTeX
Ed Gabrys
:
The International Dimensions of Cyber-Crime, Part 1.
21-32
Electronic Edition
(link)
BibTeX
Carol A. Siegel
,
Ty R. Sagalow
,
Paul Serritella
:
Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security.
33-49
Electronic Edition
(link)
BibTeX
Steve Stanek
:
Auditing Cryptography: Assessing System Security.
50-54
Electronic Edition
(link)
BibTeX
Volume 11, Number 5, 2002
Jeffrey L. Ott
:
The Semi-Truck of Justice.
2-3
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
The Wonders and Woes of Wireless.
4-9
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
ISP Liability for Third-Party Defamation.
10-14
Electronic Edition
(link)
BibTeX
Gerald L. Kovacich
,
Andy Jones
,
Perry G. Luzwick
:
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2.
15-23
Electronic Edition
(link)
BibTeX
Ed Gabrys
:
The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe's Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime.
24-32
Electronic Edition
(link)
BibTeX
Gerald Post
,
Albert Kagan
:
The Dilemma of Security Patches.
33-40
Electronic Edition
(link)
BibTeX
Bruce A. Lobree
:
Impact of Legislation on Information Security Management.
41-48
Electronic Edition
(link)
BibTeX
Volume 11, Number 6, 2003
Jeffrey L. Ott
:
A New Year, A New Beginning.
2-5
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Internet Service Providers and Search Warrants.
6-9
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Attractive Hazard: Entrapment or Forensic Tool?
10-14
Electronic Edition
(link)
BibTeX
Anton Chuvakin
:
Honeypot Essentials.
15-20
Electronic Edition
(link)
BibTeX
Thomas R. Peltier
:
Preparing for ISO 17799.
21-28
Electronic Edition
(link)
BibTeX
John O. Wylder
:
Improving Security from the Ground Up.
29-38
Electronic Edition
(link)
BibTeX
Mark B. Desman
:
The Ten Commandments of Information Security Awareness Training.
39-44
Electronic Edition
(link)
BibTeX
Fritz H. Grupe
,
William L. Kuechler Jr.
,
Scott Sweeney
:
Dealing with Data Privacy Protection: An Issue for the 21st Century.
45-56
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:47 2009 by
Michael Ley
(
ley@uni-trier.de
)