default search action
Information Systems Security, Volume 14
Volume 14, Number 1, 2005
- Jim S. Tiller:
Unification: Sooner or Later. 2-4 - Edward H. Freeman:
Cyber Courts and the Future of Justice. 5-9 - Chris Brown:
HIPAA Programs: Design and Implementation. 10-20 - Edwin Covert, Fran Nielsen:
Measuring Risk Using Existing Frameworks. 21-25 - Joon S. Park, Tito Sierra:
Security Analyses for Enterprise Instant Messaging (EIM) Systems. 26-39 - Tim Keanini:
Proactive Network Security: Making Your Network Unassailable. 40-45 - Sandeep Dhameja:
Multi-Characteristic Biometric Systems: Who Are You? 46-54
Volume 14, Number 2, 2005
- Jim S. Tiller:
Taming the New Wild West. 2-5 - Ken Dunham:
Battling the Bots. 6-9 - J. Mulligan, Adam J. Elbirt:
Desktop Security and Usability Trade-Offs: An Evaluation of Password Management Systems. 10-19 - Paul A. Henry:
Industrial-Strength Firewall Topologies. 20-26 - Todd Fitzgerald:
Building Management Commitment through Security Councils. 27-36 - Thomas R. Peltier:
Implementing an Information Security Awareness Program. 37-49
Volume 14, Number 3, 2005
- Jim S. Tiller:
Got Spam? 2-4 - Ken Dunham:
Wireless Worries and Wisdom. 5-8 - Edward H. Freeman:
Privacy and Dot.Com Bankruptcies: Protection of Personal Data. 9-13 - Sarah Gordon:
Fighting Spyware and Adware in the Enterprise. 14-17 - Gokhan Gercek, Naveed Saleem:
Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions. 18-28 - Matunda Nyanchama:
Enterprise Vulnerability Management and Its Role in Information Security Management. 29-56
Volume 14, Number 4, 2005
- Jim S. Tiller:
Digging Trenches. 2-4 - Edward H. Freeman:
Retention of Corporate E-Documents under Sarbanes - Oxley. 5-9 - Ping Lin, K. Selçuk Candan:
Hiding Tree Structured Data and Queries from Untrusted Data Stores. 10-26 - Brent Carlson, Alan Himler:
Turning Application Security Inside Out: Security for Service-Oriented Architectures (SOAs). 27-35 - Rami Jaamour:
Securing Web Services. 36-44 - Joe Licari:
Securing the Information Workplace: Managing Threats to Enterprise E-Mail, IM, and Document Sharing Environments. 45-50 - Zouheir Trabelsi:
Switched Network Sniffers Detection Technique Based on IP Packet Routing. 51-60
Volume 14, Number 5, 2005
- Jim S. Tiller:
Diminishing Perimeter. 2-4 - Edward H. Freeman:
Click Fraud: Google v. Auctions Expert International. 5-9 - Ken Dunham:
Source Code Implications for Malcode. 10-14 - William Brown, Frank Nasuti:
Sarbanes - Oxley and Enterprise Security: IT Governance - What It Takes to Get the Job Done. 15-28 - Paul A. Henry:
Firewall Considerations for the IT Manager. 29-51
Volume 14, Number 6, 2006
- Jim S. Tiller:
Visa, Everywhere You Want to Be. 2-5 - Ken Dunham:
Source Code Implications for Malcode. 6-10 - Edward H. Freeman:
Disclosure of Information Theft: The ChoicePoint Security Breach. 11-15 - Rebecca Herold:
Addressing Privacy Issues During Disaster Recovery. 16-22 - Ed English:
Why You Should Not Play the Numbers Game with Anti-Spyware Vendors. 23-26 - Diana Kelley, Ron Moritz:
Best Practices for Building a Security Operations Center. 27-32 - Rodolfo A. Milito:
The Inside-Out Approach to Infection Control. 33-37 - Andrew Storms:
Don't Trust Your Vendor's Software Distribution Methodology. 38-43 - Viswanathan Kodaganallur:
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle. 44-52
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.