


default search action
Information Systems Security, Volume 11
Volume 11, Number 1, 2002
- Jeffrey L. Ott:

The Dot. Gones and Beyond. 2-4 - Edward H. Freeman:

Third-Party Liability: Who Pays for Computer Damages? 5-9 - Thomas J. Bray:

Security Actions During Reduction in Workforce Efforts: What To Do When Downsizing. 11-15 - Bob Forbes:

The 5th Factor: Behavior Profiling Opens New Possibilities for Web Access Control. 16-22 - William L. Kuechler Jr., Fritz H. Grupe:

Digital Signatures: A Business View. 23-35 - Kelly J. Kuchta:

Forensic Fieldwork: Experience Is the Best Teacher. 36-43 - Steven Schlarman:

The Case for a Security Information System. 44-50 - Bob Worner:

Choosing the Right Security Infrastructure for E-Business Success. 51-56
Volume 11, Number 2, 2002
- Jeffrey L. Ott:

Be Prepared. 2-3 - Edward H. Freeman:

Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act. 4-8 - Michael J. Corby:

The Case for Privacy. 9-14 - Mark A. Rush, Lucas G. Paglia:

Balancing Privacy, Public Safety, and Network Security Concerns after September 11. 15-24 - Leslie D. Ball:

CIO on Center Stage: September 11 Changes Everything. 25-29 - Alan Berman:

Lessons Learned: The Aftermath of September 11. 30-37 - K. Narayanaswamy:

ISPs and Denial of Service Attacks. 38-46 - Daniel Mouly:

Strong User Authentication. 47-53
Volume 11, Number 3, 2002
- Jeffrey L. Ott:

We Are One, We Are Borg. 2-3 - Robert Rosenbaum:

The Future of Wireless Communications. 4-13 - Andres Llana Jr.:

Wireless Application Protocol (WAP) and Mobile Wireless Access. 14-21 - Gilbert Held:

Overcoming Wireless LAN Security Vulnerabilities. 22-27 - Mandy Andress:

Wireless LAN Security. 29-33 - Dennis Seymour Lee:

Wireless Internet Security. 34-50
Volume 11, Number 4, 2002
- Jeffrey L. Ott:

Everything Has Changed, But It Is All the Same. 2-3 - Edward H. Freeman:

The Digital Millennium Copyright Act. 4-8 - Andy Jones, Gerald L. Kovacich, Perry G. Luzwick:

Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1. 9-20 - Ed Gabrys:

The International Dimensions of Cyber-Crime, Part 1. 21-32 - Carol A. Siegel, Ty R. Sagalow, Paul Serritella:

Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security. 33-49 - Steve Stanek:

Auditing Cryptography: Assessing System Security. 50-54
Volume 11, Number 5, 2002
- Jeffrey L. Ott:

The Semi-Truck of Justice. 2-3 - Ralph Spencer Poore

:
The Wonders and Woes of Wireless. 4-9 - Edward H. Freeman:

ISP Liability for Third-Party Defamation. 10-14 - Gerald L. Kovacich, Andy Jones, Perry G. Luzwick:

Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2. 15-23 - Ed Gabrys:

The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe's Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime. 24-32 - Gerald Post, Albert Kagan:

The Dilemma of Security Patches. 33-40 - Bruce A. Lobree:

Impact of Legislation on Information Security Management. 41-48
Volume 11, Number 6, 2003
- Jeffrey L. Ott:

A New Year, A New Beginning. 2-5 - Edward H. Freeman:

Internet Service Providers and Search Warrants. 6-9 - Ralph Spencer Poore

:
Attractive Hazard: Entrapment or Forensic Tool? 10-14 - Anton Chuvakin:

Honeypot Essentials. 15-20 - Thomas R. Peltier:

Preparing for ISO 17799. 21-28 - John O. Wylder:

Improving Security from the Ground Up. 29-38 - Mark B. Desman:

The Ten Commandments of Information Security Awareness Training. 39-44 - Fritz H. Grupe, William L. Kuechler Jr., Scott Sweeney:

Dealing with Data Privacy Protection: An Issue for the 21st Century. 45-56

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














