Information Systems Security
, Volume 12
Volume 12, Number 1, 2003
Jeffrey L. Ott
:
The Real Cost of Computer Crime.
2-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Prosecution of Computer Virus Authors.
5-9
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Anna Kournikova Revealed.
10-16
Electronic Edition
(link)
BibTeX
Steven Hofmeyr
:
Why Today's Security Technologies Are So Inadequate: History, Implications, and New Approaches.
17-21
Electronic Edition
(link)
BibTeX
Ashish Garg
,
Jeffrey Curtis
,
Hilary Halper
:
The Financial Impact of IT Security Breaches: What Do Investors Think?
22-33
Electronic Edition
(link)
BibTeX
Thomas R. Peltier
:
Establishing Business Controls for Electronic Mail Communications.
34-42
Electronic Edition
(link)
BibTeX
Todd Fitzgerald
:
HIPAA Security Rule 101: The Time to Act Is Now.
43-53
Electronic Edition
(link)
BibTeX
Elizabeth M. Ferrarini
:
History of Best Practices Eases CareGroup's HIPAA Planning: Interview with Dr. John Halamka.
54-56
Electronic Edition
(link)
BibTeX
Volume 12, Number 2, 2003
Jeffrey L. Ott
:
An Application of Security.
2-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Privacy Notices under the Gramm - Leach - Bliley Act.
5-9
Electronic Edition
(link)
BibTeX
Mark B. Desman
:
The "KISS" Principle.
11-15
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Four Reasons Why Klez Is Widespread.
16-20
Electronic Edition
(link)
BibTeX
Sureerut Inmor
,
Vatcharaporn Esichaikul
,
Dentcho N. Batanov
:
A Security-Oriented Extension of the Object Model for the Development of an Information System.
21-36
Electronic Edition
(link)
BibTeX
Landall J. Stoltenberg
:
Application Security: Have We Locked the Windows and Left the Door Open?
37-43
Electronic Edition
(link)
BibTeX
Matunda Nyanchama
,
Marc Stefaniu
:
Analyzing Enterprise Network Vulnerabilities.
44-49
Electronic Edition
(link)
BibTeX
Todd Fitzgerald
:
The HIPAA Final Rule: What's Changed?
50-59
Electronic Edition
(link)
BibTeX
Volume 12, Number 3, 2003
Jeffrey L. Ott
:
The War on Words.
2-3
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Biometrics, Evidence, and Personal Privacy.
4-8
Electronic Edition
(link)
BibTeX
Bruce A. Lobree
:
IT Security: A Tactical War.
9-16
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Evaluating Anti-Virus Software: Which Is Best?
17-28
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Structured Investigation of Digital Incidents in Complex Computing Environments.
29-38
Electronic Edition
(link)
BibTeX
Judy D. Holmes
:
Will Big Brother Cause Your Company to Be Sued?
39-44
Electronic Edition
(link)
BibTeX
John Gordineer
:
Blended Threats: A New Era in Anti-Virus Protection.
45-47
Electronic Edition
(link)
BibTeX
Volume 12, Number 4, 2003
Rich O'Hanley
:
"A Little Neglect May Breed Mischief ...".
2-5
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Advances in Cryptography.
6-11
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State.
12-16
Electronic Edition
(link)
BibTeX
Ben Rothke
:
Who Guards the Computer Security Guards?
17-18
Electronic Edition
(link)
BibTeX
Ken Dunham
:
The Trouble with Trojans.
19-28
Electronic Edition
(link)
BibTeX
Steven Hofmeyr
:
A New Approach to Security: Learning from Immunology.
29-35
Electronic Edition
(link)
BibTeX
Robert Garigue
,
Marc Stefaniu
:
Information Security Governance Reporting.
36-40
Electronic Edition
(link)
BibTeX
Stephen C. Shih
,
H. Joseph Wen
:
Building E-Enterprise Security: A Business View.
41-49
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
A Structured Approach to Incident Postmortems.
50-56
Electronic Edition
(link)
BibTeX
Volume 12, Number 5, 2003
Jim Tiller
:
The Business of Security.
2-4
Electronic Edition
(link)
BibTeX
Felicia M. Nicastro
:
Security Patch Management.
5-18
Electronic Edition
(link)
BibTeX
Harold Long
:
Effective Use of Consultants in Your Security Programs.
19-28
Electronic Edition
(link)
BibTeX
George Sadlier
:
Storage Area Networks: An Information Security Perspective.
29-41
Electronic Edition
(link)
BibTeX
Mark Thyer
:
Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security.
42-51
Electronic Edition
(link)
BibTeX
Russ Neal
:
A Project Methodology for Disaster Recovery Testing in a Server Based Environment.
52-67
Electronic Edition
(link)
BibTeX
Volume 12, Number 6, 2004
Edward H. Freeman
:
Software Repossession: Electronic Self-Help.
2-6
Electronic Edition
(link)
BibTeX
Ken Dunham
:
EICAR Test File Security Considerations.
7-11
Electronic Edition
(link)
BibTeX
Anton Chuvakin
:
Monitoring IDS.
12-16
Electronic Edition
(link)
BibTeX
Carl Endorf
:
Outsourcing Security: The Need, the Risks, the Providers, and the Process.
17-23
Electronic Edition
(link)
BibTeX
Avi Chesla
:
Information Security: A Defensive Battle.
24-32
Electronic Edition
(link)
BibTeX
Paul A. Henry
:
Protocol and Application Awareness: A New Trend or an Established Tradition?
33-38
Electronic Edition
(link)
BibTeX
Julio César Hernández Castro
,
José María Sierra
,
Arturo Ribagorda
:
Beware of the Security Software.
39-45
Electronic Edition
(link)
BibTeX
G. Stevenson Smith
:
Recognizing and Preparing Loss Estimates from Cyber-Attacks.
46-57
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:47 2009 by
Michael Ley
(
ley@uni-trier.de
)