


default search action
Information Systems Security, Volume 8
Volume 8, Number 1, 1999
- Jeffrey L. Ott:

Preparing for the New Millennium. 3-5 - Peter Stephenson:

Information Warfare, or, Help! The Sky Is Falling! 6-10 - Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:

Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas? 11-14 - Ralph Spencer Poore

:
Ethics and the Information Security Profession. 15-17 - A. Perry Schwartz, Mitchell A. Zalewski:

Assuring Data Security Integrity at Ford Motor Company. 18-26 - Philip Carden:

Public Key Infrastructure for Messaging Security. 27-32 - Robert Rudloff, Jamie Jabouri:

Preparing for Electronic Medical Records Legislation. 33-38 - Edward H. Freeman:

Cookies and Freedom of Information: The Putnam Pit Case. 39-44 - Ed Blackwell:

Building a Solid Foundation for Intranet Security. 45-53 - David Johnson:

Secure Access to Mission-Critical Applications. 54-63 - Janice C. Sipior, Burke T. Ward, Sebastian M. Rainone:

A Strategy for Ethical Management of E-mail Privacy. 64-72 - William A. Yarberry:

Telephony Security. 73-80
Volume 8, Number 2, 1999
- Jeffrey L. Ott:

Human Nature. 3-4 - Gilbert Held:

Employing Proxy Services. 5-9 - Peter Stephenson:

Hiring Hackers. 10-13 - Edward H. Freeman:

Webwrap and the Law of Contracts. 14-20 - Ben Rothke:

Government Mandated Key Escrow: A Bad Idea That Won't Go Away? 21-25 - Harry B. DeMaio:

Getting Started with PKI. 27-36 - Dahl Gerberick, Don Huber, Robert Rudloff:

Defining a Technical Architecture for Health Care Security. 37-49 - Frederick Gallegos, Mohammad Al-abdullah:

Selected Security and Legal Issues in E-Commerce. 50-57 - Carol A. Siegel:

Intrusion Detection: Making the Business Case. 58-68 - Caroline R. Hamilton:

Risk Management and Security. 69-78
Volume 8, Number 3, 1999
- Jeffrey L. Ott:

"Professionalism". 3-4 - Peter Stephenson:

Coming of Age. 5-9 - Edward H. Freeman:

Search and Seizure of Computer Equipment. 10-15 - Ralph Spencer Poore

:
Anonymity, Privacy, and Trust. 16-20 - Steve Schlarman:

Meet Your Cracker Intrusion Management Using Criminal Profiling. 21-26 - Ralph Spencer Poore

:
Release for Public Comment. 27-77
Volume 8, Number 4, 2000
- Jeffrey L. Ott:

The New Millennium. 1-3 - Peter Stephenson:

Where Is the IDS? 1-6 - Charlene A. Dykman, Cindy Cook, H. Van Tran:

A Guide to NetWare 5 Security and Control. 1-16 - John R. Vacca:

Encryption Keys: Randomness Is Key to Their Undoing. 1-6 - Frederick Gallegos:

Software Piracy: Some Facts, Figures, and Issues. 1-23 - Charanjit Singh, Mark N. Frolick:

Ibuttons: Building the Infrastructure for More Secure E-commerce. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














