default search action
Information Systems Security, Volume 16
Volume 16, Number 1, 2007
- John Campbell, Dale Kleeman, Wanli Ma:
The Good and Not So Good of Enforcing Password Composition Rules. 2-8 - Luther Martin:
Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management. 9-14 - Jon Callas:
The Future of Cryptography. 15-22 - Sean Steele, Chris Wargo:
An Introduction to Insider Threat Management. 23-33 - Stilianos Vidalis, Zafar Kazmi:
Security Through Deception. 34-41 - Costa Constantakis:
Securing Access in Network Operations - Emerging Tools for Simplifying a Carrier's Network Security Administration. 42-46 - Alex Malin:
Designing Networks that Enforce Information Security Policies. 47-53 - Ross Ortega:
Defending the Corporate Crown Jewels from the Dangers that Lurk Within - Effective Internal Network Security Focuses on Behavior. 54-60 - Edward H. Freeman:
RFIDs and Personal Privacy. 61-64 - Ken Dunham:
Pump and Dump Scams. 65-71
Volume 16, Number 2, 2007
- Andrea Klein:
Building an Identity Management Infrastructure for Today...and Tomorrow. 74-79 - William A. Yarberry Jr.:
Effective Change Management: Ensuring Alignment of IT and Business Functions. 80-89 - Ed Ginty:
Secure Data-Archiving: How to Protect and Store Your Data. 90-92 - Vyaghreswara Rao Namuduri, S. N. Narahari Pandit:
Multimedia Digital Rights Protection Using Watermarking Techniques. 93-99 - R. Kelly Rainer Jr., Thomas E. Marshall, Kenneth J. Knapp, Gina H. Montgomery:
Do Information Security Professionals and Business Managers View Information Security Issues Differently? 100-108 - Sam Fleming:
Implicit Trust Can Lead to Data Loss. 109-113 - Richard P. Tracy:
IT Security Management and Business Process Automation: Challenges, Approaches, and Rewards. 114-122 - Ken Dunham:
OrderGun.A: A Sophisticated Rootkit. 123-126 - Edward H. Freeman:
Vulnerability Disclosure: The Strange Case of Bret McDanel. 127-131
Volume 16, Number 3, 2007
- Kevin Curran, Paul Canning:
Wireless Handheld Devices Become Trusted Network Devices. 134-146 - Steven Schlarman:
Selecting an IT Control Framework. 147-151 - Wei She, Bhavani Thuraisingham:
Security for Enterprise Resource Planning Systems. 152-163 - Lynn Erla Beegle:
Rootkits and Their Effects on Information Security. 164-176 - Bill Reed:
Implementing Information Lifecycle Security (ILS). 177-181 - Edward H. Freeman:
Email Privacy and the Wiretap Act: U.S. v. Councilman. 182-185
Volume 16, Number 4, 2007
- Ryan Sherstobitoff, Pedro Bustamante:
You Installed Internet Security on Your Network: Is Your Company Safe? 188-194 - Xin (Robert) Luo, Qinyu Liao:
Awareness Education as the Key to Ransomware Prevention. 195-202 - Richard E. Smith:
Trends in Security Product Evaluations. 203-216 - Rajni Goel:
Managing RFID Consumer Privacy and Implementation Barriers. 217-223 - Steven Schlarman:
The IT Compliance Equation: Understanding the Elements. 224-232 - Ken Dunham, Gold Honors:
Mitigating Malicious Code. 233-238 - Edward H. Freeman:
Computer Hackers and Search and Seizure: United States v. Jarrett. 239-243
Volume 16, Number 5, 2007
- Avinash W. Kadam:
Information Security Policy Development and Implementation. 246-256 - Todd Fitzgerald:
Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO Must Ask Each Other. 257-263 - Sherali Zeadally, Nicolas Sklavos, Moganakrishnan Rathakrishnan, Scott Fowler:
End-to-End Security Across Wired-Wireless Networks for Mobile Users. 264-277 - Chris Nowell:
Regulatory Compliance - the Wonderful World of FISMA. 278-280 - Sujan Maskey, Brittany Jansen, Dennis Guster, Charles Hall:
A Basic Firewall Configuration Strategy for the Protection of Development-related Computer Networks and Subnetworks. 281-290 - Edward H. Freeman:
Holistic Information Security: ISO 27001 and Due Care. 291-294 - Ken Dunham:
Reducing Remote Risks within the Enterprise. 295-299
Volume 16, Number 6, 2007
- Peter O. Okenyi, Thomas J. Owens:
On the Anatomy of Human Hacking. 302-314 - Michael Workman:
Gaining Access with Social Engineering: An Empirical Study of the Threat. 315-331 - Manpreet Singh, Manjeet Singh Patterh:
Security Functional Components for Building a Secure Network Computing Environment. 332-343 - Guillermo A. Francia III, Rahjima R. Francia:
An Empirical Study on the Performance of Java/.Net Cryptographic APIs. 344-354 - Harold J. "Rockie" Grimes:
Security Sickness in the Health Networks. 355-356 - Edward H. Freeman:
Regulatory Compliance and the Chief Compliance Officer. 357-361
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.