


default search action
Information Systems Security, Volume 7
Volume 7, Number 1, 1998
- Ralph Spencer Poore

:
Editor's Edition. 1-2
- Harold F. Tipton:

Professional Certification - What's the Point? 1-5
- Ralph Spencer Poore

:
The Lowly Password. 1-3 - Douglas G. Conorich:

UNIX Passwords. 1-9
- Benjamin Wright:

Web Certification: A Benchmark for Trustworthy Commerce. 1-4
- Karl J. Flusche:

Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore! 1-6 - Karl J. Flusche:

Unlocking the Secrets of Computer Evidence: What Would Happen if I Pressed This Key? 1-5 - Karl J. Flusche:

A Tale of Two Spies: The Outside Hacker and the Trusted Insider. 1-4 - Sarah Hewitt:

Disclosure via the Internet: Electronic Delivery of Mandated Disclosure Documents. 1-5 - Steve Trolan:

Extranet Security: What's Right for the Business? 1-10 - Ben Rothke:

DES Is Dead! Long Live ???? 1-4 - Dennis A. Dallas:

Electronic Commerce Security on the Internet. 1-9
- Caroline R. Hamilton:

New Trends in Risk Management. 1-9
Volume 7, Number 2, 1998
- Ralph Spencer Poore

:
Editor's Edition. 1-3
- Will Ozier:

An Open Letter to the Profession. 1-3
- Carl B. Jackson, Donald Bromley, Sam L. Rubenstein:

Continuity Planning and the Year 2000. 1-11 - Wynne S. Carvill:

Management Use of Internal Audit to Assure Year 2000 Preparedness. 1-6 - H. Van Tran, Cindy Cook, Charlene A. Dykman:

A Comparison of Windows NT 4 and NetWare 4 Security Models. 1-17 - Ed Blackwell:

Building a Solid Foundation for Intranet Security. 1-9 - Steven F. Blanding:

Secured Connections to External Networks. 1-16 - Christopher M. King:

Internet Electronic Mail Security. 1-7
Volume 7, Number 3, 1998
- Ralph Spencer Poore

:
As I See It ... 3-4
- Heather Smartt:

Top 10 Dial-In Security Mistakes. 5-8
- Charles Forsythe:

A Half-Dozen Rules for Securing Your Web Application. 9-12
- Ralph Spencer Poore

:
Best Practices. 13-15
- Bill Stackpole:

Thinking Right About Network Security. 16-17
- Ralph Spencer Poore:

A review of: "Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998". 18-19
- William H. Creech:

Network Sniffer Attacks. 20-30 - Thomas R. Peltier:

Information Classification. 31-43 - Clive Blatchford:

Information Security, Business, and the Internet. 44-53 - David Cullinane:

Electronic Commerce Security. 54-65 - Belden Menkus:

Understanding Security and Audit Issues in Electronic Document Interchange. 66-79
Volume 7, Number 4, 1999
- Jeffrey L. Ott:

Twelve Months to Go - and Counting. 3-4
- Ralph Spencer Poore

:
CyberScams. 5-8
- Char Sample:

A Comparison of RealSecure and NetRanger. 9-12
- Mark Blanke, Philip Carden:

NT Security Questions and Answers. 13-16
- Philip Carden:

Quantifying and Lowering Security Costs - Hard Dollars. 17-19
- Edward H. Freeman:

Issues of Jurisdiction in Cyberspace. 20-26 - H. J. Jerry Schumacher, Sumit Ghosh, Tony S. Lee:

Top Secret Traffic and the Public ATM Network Infrastructure. 27-45 - Edward H. Freeman:

Attorney - Client Privilege and Electronic Data Transmission. 46-51 - Phillip Q. Maier:

Implementing and Supporting Extranets. 52-59

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














