Information Systems Security
, Volume 14
Volume 14, Number 1, 2005
Jim Tiller
:
Unification: Sooner or Later.
2-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Cyber Courts and the Future of Justice.
5-9
Electronic Edition
(link)
BibTeX
Chris Brown
:
HIPAA Programs: Design and Implementation.
10-20
Electronic Edition
(link)
BibTeX
Edwin Covert
,
Fran Nielsen
:
Measuring Risk Using Existing Frameworks.
21-25
Electronic Edition
(link)
BibTeX
Joon S. Park
,
Tito Sierra
:
Security Analyses for Enterprise Instant Messaging (EIM) Systems.
26-39
Electronic Edition
(link)
BibTeX
Tim Keanini
:
Proactive Network Security: Making Your Network Unassailable.
40-45
Electronic Edition
(link)
BibTeX
Sandeep Dhameja
:
Multi-Characteristic Biometric Systems: Who Are You?
46-54
Electronic Edition
(link)
BibTeX
Volume 14, Number 2, 2005
Jim Tiller
:
Taming the New Wild West.
2-5
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Battling the Bots.
6-9
Electronic Edition
(link)
BibTeX
J. Mulligan
,
Adam J. Elbirt
:
Desktop Security and Usability Trade-Offs: An Evaluation of Password Management Systems.
10-19
Electronic Edition
(link)
BibTeX
Paul A. Henry
:
Industrial-Strength Firewall Topologies.
20-26
Electronic Edition
(link)
BibTeX
Todd Fitzgerald
:
Building Management Commitment through Security Councils.
27-36
Electronic Edition
(link)
BibTeX
Thomas R. Peltier
:
Implementing an Information Security Awareness Program.
37-49
Electronic Edition
(link)
BibTeX
Volume 14, Number 3, 2005
Jim Tiller
:
Got Spam?
2-4
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Wireless Worries and Wisdom.
5-8
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Privacy and Dot.Com Bankruptcies: Protection of Personal Data.
9-13
Electronic Edition
(link)
BibTeX
Sarah Gordon
:
Fighting Spyware and Adware in the Enterprise.
14-17
Electronic Edition
(link)
BibTeX
Gokhan Gercek
,
Naveed Saleem
:
Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions.
18-28
Electronic Edition
(link)
BibTeX
Matunda Nyanchama
:
Enterprise Vulnerability Management and Its Role in Information Security Management.
29-56
Electronic Edition
(link)
BibTeX
Volume 14, Number 4, 2005
Jim Tiller
:
Digging Trenches.
2-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Retention of Corporate E-Documents under Sarbanes - Oxley.
5-9
Electronic Edition
(link)
BibTeX
Ping Lin
,
K. Selçuk Candan
:
Hiding Tree Structured Data and Queries from Untrusted Data Stores.
10-26
Electronic Edition
(link)
BibTeX
Brent Carlson
,
Alan Himler
:
Turning Application Security Inside Out: Security for Service-Oriented Architectures (SOAs).
27-35
Electronic Edition
(link)
BibTeX
Rami Jaamour
:
Securing Web Services.
36-44
Electronic Edition
(link)
BibTeX
Joe Licari
:
Securing the Information Workplace: Managing Threats to Enterprise E-Mail, IM, and Document Sharing Environments.
45-50
Electronic Edition
(link)
BibTeX
Zouheir Trabelsi
:
Switched Network Sniffers Detection Technique Based on IP Packet Routing.
51-60
Electronic Edition
(link)
BibTeX
Volume 14, Number 5, 2005
Jim Tiller
:
Diminishing Perimeter.
2-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Click Fraud: Google v. Auctions Expert International.
5-9
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Source Code Implications for Malcode.
10-14
Electronic Edition
(link)
BibTeX
William Brown
,
Frank Nasuti
:
Sarbanes - Oxley and Enterprise Security: IT Governance - What It Takes to Get the Job Done.
15-28
Electronic Edition
(link)
BibTeX
Paul A. Henry
:
Firewall Considerations for the IT Manager.
29-51
Electronic Edition
(link)
BibTeX
Volume 14, Number 6, 2006
Jim Tiller
:
Visa, Everywhere You Want to Be.
2-5
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Source Code Implications for Malcode.
6-10
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Disclosure of Information Theft: The ChoicePoint Security Breach.
11-15
Electronic Edition
(link)
BibTeX
Rebecca Herold
:
Addressing Privacy Issues During Disaster Recovery.
16-22
Electronic Edition
(link)
BibTeX
Ed English
:
Why You Should Not Play the Numbers Game with Anti-Spyware Vendors.
23-26
Electronic Edition
(link)
BibTeX
Diana Kelley
,
Ron Moritz
:
Best Practices for Building a Security Operations Center.
27-32
Electronic Edition
(link)
BibTeX
Rodolfo A. Milito
:
The Inside-Out Approach to Infection Control.
33-37
Electronic Edition
(link)
BibTeX
Andrew Storms
:
Don't Trust Your Vendor's Software Distribution Methodology.
38-43
Electronic Edition
(link)
BibTeX
Viswanathan Kodaganallur
:
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle.
44-52
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:48 2009 by
Michael Ley
(
ley@uni-trier.de
)