


default search action
Information Systems Security, Volume 12
Volume 12, Number 1, 2003
- Jeffrey L. Ott:

The Real Cost of Computer Crime. 2-4 - Edward H. Freeman:

Prosecution of Computer Virus Authors. 5-9 - Ken Dunham:

Anna Kournikova Revealed. 10-16 - Steven A. Hofmeyr

:
Why Today's Security Technologies Are So Inadequate: History, Implications, and New Approaches. 17-21 - Ashish Garg, Jeffrey Curtis, Hilary Halper:

The Financial Impact of IT Security Breaches: What Do Investors Think? 22-33 - Thomas R. Peltier:

Establishing Business Controls for Electronic Mail Communications. 34-42 - Todd Fitzgerald:

HIPAA Security Rule 101: The Time to Act Is Now. 43-53 - Elizabeth M. Ferrarini:

History of Best Practices Eases CareGroup's HIPAA Planning: Interview with Dr. John Halamka. 54-56
Volume 12, Number 2, 2003
- Jeffrey L. Ott:

An Application of Security. 2-4 - Edward H. Freeman:

Privacy Notices under the Gramm - Leach - Bliley Act. 5-9 - Mark B. Desman:

The "KISS" Principle. 11-15 - Ken Dunham:

Four Reasons Why Klez Is Widespread. 16-20 - Sureerut Inmor, Vatcharaporn Esichaikul, Dentcho N. Batanov:

A Security-Oriented Extension of the Object Model for the Development of an Information System. 21-36 - Landall J. Stoltenberg:

Application Security: Have We Locked the Windows and Left the Door Open? 37-43 - Matunda Nyanchama, Marc Stefaniu:

Analyzing Enterprise Network Vulnerabilities. 44-49 - Todd Fitzgerald:

The HIPAA Final Rule: What's Changed? 50-59
Volume 12, Number 3, 2003
- Jeffrey L. Ott:

The War on Words. 2-3 - Edward H. Freeman:

Biometrics, Evidence, and Personal Privacy. 4-8 - Bruce A. Lobree:

IT Security: A Tactical War. 9-16 - Ken Dunham:

Evaluating Anti-Virus Software: Which Is Best? 17-28 - Peter Stephenson:

Structured Investigation of Digital Incidents in Complex Computing Environments. 29-38 - Judy D. Holmes:

Will Big Brother Cause Your Company to Be Sued? 39-44 - John Gordineer:

Blended Threats: A New Era in Anti-Virus Protection. 45-47
Volume 12, Number 4, 2003
- Rich O'Hanley:

"A Little Neglect May Breed Mischief ...". 2-5 - Ralph Spencer Poore

:
Advances in Cryptography. 6-11 - Edward H. Freeman:

Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State. 12-16 - Ben Rothke:

Who Guards the Computer Security Guards? 17-18 - Ken Dunham:

The Trouble with Trojans. 19-28 - Steven A. Hofmeyr

:
A New Approach to Security: Learning from Immunology. 29-35 - Robert Garigue, Marc Stefaniu:

Information Security Governance Reporting. 36-40 - Stephen C. Shih, H. Joseph Wen:

Building E-Enterprise Security: A Business View. 41-49 - Peter Stephenson:

A Structured Approach to Incident Postmortems. 50-56
Volume 12, Number 5, 2003
- Jim S. Tiller:

The Business of Security. 2-4 - Felicia M. Nicastro:

Security Patch Management. 5-18 - Harold Long:

Effective Use of Consultants in Your Security Programs. 19-28 - George Sadlier:

Storage Area Networks: An Information Security Perspective. 29-41 - Mark Thyer:

Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security. 42-51 - Russ Neal:

A Project Methodology for Disaster Recovery Testing in a Server Based Environment. 52-67
Volume 12, Number 6, 2004
- Edward H. Freeman:

Software Repossession: Electronic Self-Help. 2-6 - Ken Dunham:

EICAR Test File Security Considerations. 7-11 - Anton Chuvakin:

Monitoring IDS. 12-16 - Carl F. Endorf:

Outsourcing Security: The Need, the Risks, the Providers, and the Process. 17-23 - Avi Chesla:

Information Security: A Defensive Battle. 24-32 - Paul A. Henry:

Protocol and Application Awareness: A New Trend or an Established Tradition? 33-38 - Julio César Hernández Castro

, José María Sierra
, Arturo Ribagorda:
Beware of the Security Software. 39-45 - G. Stevenson Smith:

Recognizing and Preparing Loss Estimates from Cyber-Attacks. 46-57

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














