


default search action
Information Systems Security, Volume 15
Volume 15, Number 1, 2006
- Jim S. Tiller:

The Lion and the Gazelle. 2-5 - Ken Dunham:

Money Mules: An Investigative View. 6-10 - Edward H. Freeman:

Wardriving: Unauthorized Access to Wi-Fi Networks. 11-15 - Art Gilliland:

Understanding the IM Security Threat. 16-20 - Sumit Dhar:

Securing and Hardening RedHat Linux. 21-30 - Tommy Ward:

Security of Backup Data. 31-34 - Bond Masuda:

Managing the Risks of Managed Security Services. 35-42 - Russ Neal:

Social Psychological Variables That Contribute to Resistance to Security Assessment Findings. 43-52
Volume 15, Number 2, 2006
- James S. Tiller:

Security Answers the Call. 2-4 - Ken Dunham:

The Problem with P2P. 5-8 - Darrell Epps, Scott Tanner, Carl Silva:

Can VoIP Secure Itself for the Next Technology Wave?: A Look at Assessing Vulnerability in a Converged Environment. 9-15 - Bogdan Materna:

Proactive Security for VoIP Networks. 16-21 - Kevin Curran

, John Stephen Honan:
Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution. 22-41 - Xin Luo:

A Holistic Approach for Managing Spyware. 42-48 - Ramanan Ramanathan:

Thinking Beyond Security. 49-54
Volume 15, Number 3, 2006
- James S. Tiller:

Virtual Security: The New Security Tool? 2-4 - Edward H. Freeman:

Open Source Software and the SCO Litigation. 5-9 - J. Patrick Ravenel:

Effective Operational Security Metrics. 10-17 - Paul Chen:

E-Mail Archiving: Understanding the Reasons, Risks, and Rewards. 18-23 - Rebecca Herold:

Building an Effective Privacy Program. 24-35 - Zeinab Karake Shalhoub:

Content Analysis of Web Privacy Policies in the GCC Countries. 36-45 - Karim Toubba:

Employing Encryption to Secure Consumer Data. 46-54
Volume 15, Number 4, 2006
- Edward H. Freeman:

Gmail and Privacy Issues. 2-6 - John Kindervag:

The Five Myths of Wireless Security. 7-16 - Kevin Curran

, Elaine Smyth:
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. 17-38 - Brian Hernacki:

Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do. 39-42 - Stuart C. K. So

, John J. Liu:
Securing RFID Applications: Issues, Methods, and Controls. 43-50 - Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., Dorsey W. Morrow:

The Top Information Security Issues Facing Organizations: What Can Government Do to Help? 51-58
Volume 15, Number 5, 2006
- Ken Dunham:

MetaFisher: Next-Generation Bots and Phishing. 2-6 - Abe Kleinfeld:

Measuring Security. 7-12 - Thomas R. Peltier:

Social Engineering: Concepts and Solutions. 13-21 - Gerald V. Post, Albert Kagan:

Information Security Tradeoffs: The User Perspective. 22-29 - Elizabeth A. Nichols, Andrew Sudbury:

Implementing Security Metrics Initiatives. 30-38 - David M. Lynch:

Securing Against Insider Attacks. 39-47 - Alan Murphy:

Protecting Your Internal Resources with Intranet Application Firewalls. 48-53
Volume 15, Number 6, 2006
- Ken Dunham:

Year of the Rootkit. 2-6 - Edward H. Freeman:

Service of Process by Email. 7-11 - Tyson Macaulay:

Risk Conductors. 12-24 - Mohammad Talib, Francis Joseph Ogwu, Atawneh Samer:

A New Algorithm for Hiding Gray Images Using Blocks. 25-29 - Cezar Drugescu, Rafael Etges:

Maximizing the Return on Investment on Information Security Programs: Program Governance and Metrics. 30-40 - Richard G. Vedder:

Katrina's Gift: A Wake-Up Call for Improved Disaster Planning. 41-44 - Joseph A. Cazier

, B. Dawn Medlin:
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times. 45-55 - Mark Ryan del Moral Talabis:

Honeynet Learning: Discovering Information Security. 56-63 - Jim Vandermeer:

Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees' email usage is not putting your company at risk. 64-75

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














