


default search action
Information Systems Security, Volume 14
Volume 14, Number 1, 2005
- Jim S. Tiller:

Unification: Sooner or Later. 2-4 - Edward H. Freeman:

Cyber Courts and the Future of Justice. 5-9 - Chris Brown:

HIPAA Programs: Design and Implementation. 10-20 - Edwin Covert, Fran Nielsen:

Measuring Risk Using Existing Frameworks. 21-25 - Joon S. Park, Tito Sierra:

Security Analyses for Enterprise Instant Messaging (EIM) Systems. 26-39 - Tim Keanini:

Proactive Network Security: Making Your Network Unassailable. 40-45 - Sandeep Dhameja:

Multi-Characteristic Biometric Systems: Who Are You? 46-54
Volume 14, Number 2, 2005
- Jim S. Tiller:

Taming the New Wild West. 2-5 - Ken Dunham:

Battling the Bots. 6-9 - J. Mulligan, Adam J. Elbirt:

Desktop Security and Usability Trade-Offs: An Evaluation of Password Management Systems. 10-19 - Paul A. Henry:

Industrial-Strength Firewall Topologies. 20-26 - Todd Fitzgerald:

Building Management Commitment through Security Councils. 27-36 - Thomas R. Peltier:

Implementing an Information Security Awareness Program. 37-49
Volume 14, Number 3, 2005
- Jim S. Tiller:

Got Spam? 2-4 - Ken Dunham:

Wireless Worries and Wisdom. 5-8 - Edward H. Freeman:

Privacy and Dot.Com Bankruptcies: Protection of Personal Data. 9-13 - Sarah Gordon:

Fighting Spyware and Adware in the Enterprise. 14-17 - Gokhan Gercek, Naveed Saleem:

Securing Small Business Computer Networks: An Examination of Primary Security Threats and Their Solutions. 18-28 - Matunda Nyanchama:

Enterprise Vulnerability Management and Its Role in Information Security Management. 29-56
Volume 14, Number 4, 2005
- Jim S. Tiller:

Digging Trenches. 2-4 - Edward H. Freeman:

Retention of Corporate E-Documents under Sarbanes - Oxley. 5-9 - Ping Lin, K. Selçuk Candan:

Hiding Tree Structured Data and Queries from Untrusted Data Stores. 10-26 - Brent Carlson, Alan Himler:

Turning Application Security Inside Out: Security for Service-Oriented Architectures (SOAs). 27-35 - Rami Jaamour:

Securing Web Services. 36-44 - Joe Licari:

Securing the Information Workplace: Managing Threats to Enterprise E-Mail, IM, and Document Sharing Environments. 45-50 - Zouheir Trabelsi:

Switched Network Sniffers Detection Technique Based on IP Packet Routing. 51-60
Volume 14, Number 5, 2005
- Jim S. Tiller:

Diminishing Perimeter. 2-4 - Edward H. Freeman:

Click Fraud: Google v. Auctions Expert International. 5-9 - Ken Dunham:

Source Code Implications for Malcode. 10-14 - William Brown, Frank Nasuti:

Sarbanes - Oxley and Enterprise Security: IT Governance - What It Takes to Get the Job Done. 15-28 - Paul A. Henry:

Firewall Considerations for the IT Manager. 29-51
Volume 14, Number 6, 2006
- Jim S. Tiller:

Visa, Everywhere You Want to Be. 2-5 - Ken Dunham:

Source Code Implications for Malcode. 6-10 - Edward H. Freeman:

Disclosure of Information Theft: The ChoicePoint Security Breach. 11-15 - Rebecca Herold:

Addressing Privacy Issues During Disaster Recovery. 16-22 - Ed English:

Why You Should Not Play the Numbers Game with Anti-Spyware Vendors. 23-26 - Diana Kelley, Ron Moritz:

Best Practices for Building a Security Operations Center. 27-32 - Rodolfo A. Milito:

The Inside-Out Approach to Infection Control. 33-37 - Andrew Storms:

Don't Trust Your Vendor's Software Distribution Methodology. 38-43 - Viswanathan Kodaganallur:

Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle. 44-52

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














