Information Systems Security
, Volume 15
Volume 15, Number 1, 2006
Jim Tiller
:
The Lion and the Gazelle.
2-5
Electronic Edition
(link)
BibTeX
Ken Dunham
:
Money Mules: An Investigative View.
6-10
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Wardriving: Unauthorized Access to Wi-Fi Networks.
11-15
Electronic Edition
(link)
BibTeX
Art Gilliland
:
Understanding the IM Security Threat.
16-20
Electronic Edition
(link)
BibTeX
Sumit Dhar
:
Securing and Hardening RedHat Linux.
21-30
Electronic Edition
(link)
BibTeX
Tommy Ward
:
Security of Backup Data.
31-34
Electronic Edition
(link)
BibTeX
Bond Masuda
:
Managing the Risks of Managed Security Services.
35-42
Electronic Edition
(link)
BibTeX
Russ Neal
:
Social Psychological Variables That Contribute to Resistance to Security Assessment Findings.
43-52
Electronic Edition
(link)
BibTeX
Volume 15, Number 2, 2006
James Tiller
:
Security Answers the Call.
2-4
Electronic Edition
(link)
BibTeX
Ken Dunham
:
The Problem with P2P.
5-8
Electronic Edition
(link)
BibTeX
Darrell Epps
,
Scott Tanner
,
Carl Silva
:
Can VoIP Secure Itself for the Next Technology Wave?: A Look at Assessing Vulnerability in a Converged Environment.
9-15
Electronic Edition
(link)
BibTeX
Bogdan Materna
:
Proactive Security for VoIP Networks.
16-21
Electronic Edition
(link)
BibTeX
Kevin Curran
,
John Honan
:
Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution.
22-41
Electronic Edition
(link)
BibTeX
Xin Luo
:
A Holistic Approach for Managing Spyware.
42-48
Electronic Edition
(link)
BibTeX
Ramanan Ramanathan
:
Thinking Beyond Security.
49-54
Electronic Edition
(link)
BibTeX
Volume 15, Number 3, 2006
James Tiller
:
Virtual Security: The New Security Tool?
2-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Open Source Software and the SCO Litigation.
5-9
Electronic Edition
(link)
BibTeX
J. Patrick Ravenel
:
Effective Operational Security Metrics.
10-17
Electronic Edition
(link)
BibTeX
Paul Chen
:
E-Mail Archiving: Understanding the Reasons, Risks, and Rewards.
18-23
Electronic Edition
(link)
BibTeX
Rebecca Herold
:
Building an Effective Privacy Program.
24-35
Electronic Edition
(link)
BibTeX
Zeinab Karake Shalhoub
:
Content Analysis of Web Privacy Policies in the GCC Countries.
36-45
Electronic Edition
(link)
BibTeX
Karim Toubba
:
Employing Encryption to Secure Consumer Data.
46-54
Electronic Edition
(link)
BibTeX
Volume 15, Number 4, 2006
Edward H. Freeman
:
Gmail and Privacy Issues.
2-6
Electronic Edition
(link)
BibTeX
John Kindervag
:
The Five Myths of Wireless Security.
7-16
Electronic Edition
(link)
BibTeX
Kevin Curran
,
Elaine Smyth
:
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks.
17-38
Electronic Edition
(link)
BibTeX
Brian Hernacki
:
Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do.
39-42
Electronic Edition
(link)
BibTeX
Stuart C. K. So
,
John J. Liu
:
Securing RFID Applications: Issues, Methods, and Controls.
43-50
Electronic Edition
(link)
BibTeX
Kenneth J. Knapp
,
Thomas E. Marshall
,
R. Kelly Rainer Jr.
,
Dorsey W. Morrow
:
The Top Information Security Issues Facing Organizations: What Can Government Do to Help?
51-58
Electronic Edition
(link)
BibTeX
Volume 15, Number 5, 2006
Ken Dunham
:
MetaFisher: Next-Generation Bots and Phishing.
2-6
Electronic Edition
(link)
BibTeX
Abe Kleinfeld
:
Measuring Security.
7-12
Electronic Edition
(link)
BibTeX
Thomas R. Peltier
:
Social Engineering: Concepts and Solutions.
13-21
Electronic Edition
(link)
BibTeX
Gerald V. Post
,
Albert Kagan
:
Information Security Tradeoffs: The User Perspective.
22-29
Electronic Edition
(link)
BibTeX
Elizabeth A. Nichols
,
Andrew Sudbury
:
Implementing Security Metrics Initiatives.
30-38
Electronic Edition
(link)
BibTeX
David M. Lynch
:
Securing Against Insider Attacks.
39-47
Electronic Edition
(link)
BibTeX
Alan Murphy
:
Protecting Your Internal Resources with Intranet Application Firewalls.
48-53
Electronic Edition
(link)
BibTeX
Volume 15, Number 6, 2006
Ken Dunham
:
Year of the Rootkit.
2-6
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Service of Process by Email.
7-11
Electronic Edition
(link)
BibTeX
Tyson Macaulay
:
Risk Conductors.
12-24
Electronic Edition
(link)
BibTeX
Mohammad Talib
,
Francis Joseph Ogwu
,
A. Samer
:
A New Algorithm for Hiding Gray Images Using Blocks.
25-29
Electronic Edition
(link)
BibTeX
Cezar Drugescu
,
Rafael Etges
:
Maximizing the Return on Investment on Information Security Programs: Program Governance and Metrics.
30-40
Electronic Edition
(link)
BibTeX
Richard G. Vedder
:
Katrina's Gift: A Wake-Up Call for Improved Disaster Planning.
41-44
Electronic Edition
(link)
BibTeX
Joseph A. Cazier
,
B. Dawn Medlin
:
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times.
45-55
Electronic Edition
(link)
BibTeX
Mark Ryan del Moral Talabis
:
Honeynet Learning: Discovering Information Security.
56-63
Electronic Edition
(link)
BibTeX
Jim Vandermeer
:
Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees' email usage is not putting your company at risk.
64-75
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:48 2009 by
Michael Ley
(
ley@uni-trier.de
)