default search action
Information Systems Security, Volume 11
Volume 11, Number 1, 2002
- Jeffrey L. Ott:
The Dot. Gones and Beyond. 2-4 - Edward H. Freeman:
Third-Party Liability: Who Pays for Computer Damages? 5-9 - Thomas J. Bray:
Security Actions During Reduction in Workforce Efforts: What To Do When Downsizing. 11-15 - Bob Forbes:
The 5th Factor: Behavior Profiling Opens New Possibilities for Web Access Control. 16-22 - William L. Kuechler Jr., Fritz H. Grupe:
Digital Signatures: A Business View. 23-35 - Kelly J. Kuchta:
Forensic Fieldwork: Experience Is the Best Teacher. 36-43 - Steven Schlarman:
The Case for a Security Information System. 44-50 - Bob Worner:
Choosing the Right Security Infrastructure for E-Business Success. 51-56
Volume 11, Number 2, 2002
- Jeffrey L. Ott:
Be Prepared. 2-3 - Edward H. Freeman:
Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act. 4-8 - Michael J. Corby:
The Case for Privacy. 9-14 - Mark A. Rush, Lucas G. Paglia:
Balancing Privacy, Public Safety, and Network Security Concerns after September 11. 15-24 - Leslie D. Ball:
CIO on Center Stage: September 11 Changes Everything. 25-29 - Alan Berman:
Lessons Learned: The Aftermath of September 11. 30-37 - K. Narayanaswamy:
ISPs and Denial of Service Attacks. 38-46 - Daniel Mouly:
Strong User Authentication. 47-53
Volume 11, Number 3, 2002
- Jeffrey L. Ott:
We Are One, We Are Borg. 2-3 - Robert Rosenbaum:
The Future of Wireless Communications. 4-13 - Andres Llana Jr.:
Wireless Application Protocol (WAP) and Mobile Wireless Access. 14-21 - Gilbert Held:
Overcoming Wireless LAN Security Vulnerabilities. 22-27 - Mandy Andress:
Wireless LAN Security. 29-33 - Dennis Seymour Lee:
Wireless Internet Security. 34-50
Volume 11, Number 4, 2002
- Jeffrey L. Ott:
Everything Has Changed, But It Is All the Same. 2-3 - Edward H. Freeman:
The Digital Millennium Copyright Act. 4-8 - Andy Jones, Gerald L. Kovacich, Perry G. Luzwick:
Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1. 9-20 - Ed Gabrys:
The International Dimensions of Cyber-Crime, Part 1. 21-32 - Carol A. Siegel, Ty R. Sagalow, Paul Serritella:
Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security. 33-49 - Steve Stanek:
Auditing Cryptography: Assessing System Security. 50-54
Volume 11, Number 5, 2002
- Jeffrey L. Ott:
The Semi-Truck of Justice. 2-3 - Ralph Spencer Poore:
The Wonders and Woes of Wireless. 4-9 - Edward H. Freeman:
ISP Liability for Third-Party Defamation. 10-14 - Gerald L. Kovacich, Andy Jones, Perry G. Luzwick:
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2. 15-23 - Ed Gabrys:
The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe's Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime. 24-32 - Gerald Post, Albert Kagan:
The Dilemma of Security Patches. 33-40 - Bruce A. Lobree:
Impact of Legislation on Information Security Management. 41-48
Volume 11, Number 6, 2003
- Jeffrey L. Ott:
A New Year, A New Beginning. 2-5 - Edward H. Freeman:
Internet Service Providers and Search Warrants. 6-9 - Ralph Spencer Poore:
Attractive Hazard: Entrapment or Forensic Tool? 10-14 - Anton Chuvakin:
Honeypot Essentials. 15-20 - Thomas R. Peltier:
Preparing for ISO 17799. 21-28 - John O. Wylder:
Improving Security from the Ground Up. 29-38 - Mark B. Desman:
The Ten Commandments of Information Security Awareness Training. 39-44 - Fritz H. Grupe, William L. Kuechler Jr., Scott Sweeney:
Dealing with Data Privacy Protection: An Issue for the 21st Century. 45-56
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.