Information Systems Security
, Volume 8
Volume 8, Number 1, 1999
Jeffrey Ott
:
Preparing for the New Millennium.
3-5
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Information Warfare, or, Help! The Sky Is Falling!
6-10
Electronic Edition
(link)
BibTeX
Michael E. Whitman
,
Anthony M. Townsend
,
Robert J. Aalberts
:
Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas?
11-14
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Ethics and the Information Security Profession.
15-17
Electronic Edition
(link)
BibTeX
A. Perry Schwartz
,
Mitchell A. Zalewski
:
Assuring Data Security Integrity at Ford Motor Company.
18-26
Electronic Edition
(link)
BibTeX
Philip Carden
:
Public Key Infrastructure for Messaging Security.
27-32
Electronic Edition
(link)
BibTeX
Robert Rudloff
,
Jamie Jabouri
:
Preparing for Electronic Medical Records Legislation.
33-38
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Cookies and Freedom of Information: The Putnam Pit Case.
39-44
Electronic Edition
(link)
BibTeX
Ed Blackwell
:
Building a Solid Foundation for Intranet Security.
45-53
Electronic Edition
(link)
BibTeX
David Johnson
:
Secure Access to Mission-Critical Applications.
54-63
Electronic Edition
(link)
BibTeX
Janice C. Sipior
,
Burke T. Ward
,
Sebastian M. Rainone
:
A Strategy for Ethical Management of E-mail Privacy.
64-72
Electronic Edition
(link)
BibTeX
William Yarberry
:
Telephony Security.
73-80
Electronic Edition
(link)
BibTeX
Volume 8, Number 2, 1999
Jeffrey L. Ott
:
Human Nature.
3-4
Electronic Edition
(link)
BibTeX
Gilbert Held
:
Employing Proxy Services.
5-9
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Hiring Hackers.
10-13
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Webwrap and the Law of Contracts.
14-20
Electronic Edition
(link)
BibTeX
Ben Rothke
:
Government Mandated Key Escrow: A Bad Idea That Won't Go Away?
21-25
Electronic Edition
(link)
BibTeX
Harry Demaio
:
Getting Started with PKI.
27-36
Electronic Edition
(link)
BibTeX
Dahl Gerberick
,
Don Huber
,
Robert Rudloff
:
Defining a Technical Architecture for Health Care Security.
37-49
Electronic Edition
(link)
BibTeX
Frederick Gallegos
,
Mohammad Al-abdullah
:
Selected Security and Legal Issues in E-Commerce.
50-57
Electronic Edition
(link)
BibTeX
Carol A. Siegel
:
Intrusion Detection: Making the Business Case.
58-68
Electronic Edition
(link)
BibTeX
Caroline R. Hamilton
:
Risk Management and Security.
69-78
Electronic Edition
(link)
BibTeX
Volume 8, Number 3, 1999
Jeffrey L. Ott
:
"Professionalism".
3-4
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Coming of Age.
5-9
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Search and Seizure of Computer Equipment.
10-15
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Anonymity, Privacy, and Trust.
16-20
Electronic Edition
(link)
BibTeX
Steve Schlarman
:
Meet Your Cracker Intrusion Management Using Criminal Profiling.
21-26
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Release for Public Comment.
27-77
Electronic Edition
(link)
BibTeX
Volume 8, Number 4, 2000
Jeffrey L. Ott
:
The New Millennium.
1-3
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Where Is the IDS?
1-6
Electronic Edition
(link)
BibTeX
Charlene A. Dykman
,
Cindy Cook
,
H. Van Tran
:
A Guide to NetWare 5 Security and Control.
1-16
Electronic Edition
(link)
BibTeX
John R. Vacca
:
Encryption Keys: Randomness Is Key to Their Undoing.
1-6
Electronic Edition
(link)
BibTeX
Frederick Gallegos
:
Software Piracy: Some Facts, Figures, and Issues.
1-23
Electronic Edition
(link)
BibTeX
Charanjit Singh
,
Mark N. Frolick
:
Ibuttons: Building the Infrastructure for More Secure E-commerce.
1-8
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:47 2009 by
Michael Ley
(
ley@uni-trier.de
)