Information Systems Security
, Volume 9
Volume 9, Number 1, 2000
Jeffrey L. Ott
:
Information Security in the New Millennium.
1-3
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Assessing Vulnerabilities.
1-5
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Access Control Using Attribute Certificates.
1-7
Electronic Edition
(link)
BibTeX
Ben Rothke
:
Should You Trust the NSA?
1-7
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Director Liability in Computer Negligence Cases.
1-5
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
Computer Forensics Today.
1-5
Electronic Edition
(link)
BibTeX
John R. Vacca
:
The European Data Protection Directive: A Roadblock to International Trade?
1-10
Electronic Edition
(link)
BibTeX
Frederick Gallegos
:
Database Protection: Selected Legal and Technical Issues.
1-13
Electronic Edition
(link)
BibTeX
Volume 9, Number 2, 2000
Jeffrey L. Ott
:
Defining a Value Proposition for Information Security.
1-3
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Freedom of Speech in Cyberspace: Intel v. Hamidi.
1-5
Electronic Edition
(link)
BibTeX
Jim S. Tiller
,
Bryan D. Fish
:
Packet Sniffers and Network Monitors.
1-8
Electronic Edition
(link)
BibTeX
Bruce Murphy
,
Steve Schlarman
,
Rik Boren
:
Enterprise Security Architecture.
1-14
Electronic Edition
(link)
BibTeX
Al Holzinger
:
Information Security Management and Assurance A Call to Action for Corporate Governance.
1-8
Electronic Edition
(link)
BibTeX
Tim Clark
:
Virtual Private Networks with QoS.
1-8
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
Building a Business Case for Computer Forensics.
1-5
Electronic Edition
(link)
BibTeX
Volume 9, Number 3, 2000
Jeffrey L. Ott
:
The Value Proposition of Information Security: Putting The Pieces In Place.
1-3
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Standards or Best Practices - Conflicting Interests.
1-6
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Privacy and the Value of Personal Data.
1-6
Electronic Edition
(link)
BibTeX
Jim S. Tiller
,
Bryan D. Fish
:
Packet Sniffers and Network Monitors, Part 2.
1-15
Electronic Edition
(link)
BibTeX
Jonathan Chinitz
:
Single Sign-On: Is It Really Possible?
1-14
Electronic Edition
(link)
BibTeX
Farley Stewart
:
Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues.
1-7
Electronic Edition
(link)
BibTeX
Volume 9, Number 4, 2000
Jeffrey L. Ott
:
Defining A Value Proposition For Information Security... The Complete Picture.
1-3
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
Flying by the Seat of Our Pants.
1-5
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Anonymity on the Internet: ACLU of Georgia v. Miller.
1-6
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Valuing Information Assets for Security Risk Management.
1-7
Electronic Edition
(link)
BibTeX
Bryan T. Koch
:
Enclaves: The Enterprise as an Extranet.
1-10
Electronic Edition
(link)
BibTeX
John R. Vacca
:
The Dangerous Precedent Set in the Use of Electronic Identifiers.
1-8
Electronic Edition
(link)
BibTeX
David Goldman
:
Introducing Windows 2000 Security: Features and Management.
1-9
Electronic Edition
(link)
BibTeX
Ben Rothke
:
The Growing Problem of Virus Hoaxes.
1-6
Electronic Edition
(link)
BibTeX
Volume 9, Number 5, 2000
Jeffrey L. Ott
:
Pity the Poor Hacker.
1-3
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
It's a Strange, Strange, Strange, Strange World.
1-6
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
State Control of Unsolicited E-mail: State of Washington v. Heckel.
1-5
Electronic Edition
(link)
BibTeX
Rich O'Hanley
:
WebSec 2000.
1-2
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Computer Forensics and Privacy: At What Price Do We Police the Internet?
1-5
Electronic Edition
(link)
BibTeX
H. Merrill Lynch
:
Firewall Fundamentals.
1-11
Electronic Edition
(link)
BibTeX
Kelly J. Kuchta
:
What Happened?
1-5
Electronic Edition
(link)
BibTeX
Gerald V. Post
,
Albert Kagan
,
Stephen P. Balogh
:
Security Implications of Virus Management.
1-7
Electronic Edition
(link)
BibTeX
Erik Safsten
:
Five Keys to Protecting Your Organization's E-mail.
1-6
Electronic Edition
(link)
BibTeX
Kurt Manske
:
An Introduction to Social Engineering.
1-7
Electronic Edition
(link)
BibTeX
Volume 9, Number 6, 2001
Jeffrey L. Ott
:
It Takes More Than a Village.
1-3
Electronic Edition
(link)
BibTeX
Peter Stephenson
:
France and the Art of Intrusion Detection.
1-4
Electronic Edition
(link)
BibTeX
Edward H. Freeman
:
Internet Gripe Sites: Bally v. Faber.
1-5
Electronic Edition
(link)
BibTeX
Susan Hansche
:
Designing a Security Awareness Program: Part 1.
1-9
Electronic Edition
(link)
BibTeX
Michael Erbschloe
:
Lessons from Love Crimes.
1-9
Electronic Edition
(link)
BibTeX
Glenn Miller
:
Modems: The Unlocked Back Door.
1-5
Electronic Edition
(link)
BibTeX
Matunda Nyanchama
,
Paul Sop
:
Enterprise Security Management: Managing Complexity.
1-8
Electronic Edition
(link)
BibTeX
Brad Oates
:
Cyber Crime: How Technology Makes It Easy and What to Do About It.
1-6
Electronic Edition
(link)
BibTeX
Ralph Spencer Poore
:
Information Security Techniques for Data Tracing.
1-6
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:47 2009 by
Michael Ley
(
ley@uni-trier.de
)