


default search action
Information Systems Security, Volume 9
Volume 9, Number 1, 2000
- Jeffrey L. Ott:

Information Security in the New Millennium. 1-3 - Peter Stephenson:

Assessing Vulnerabilities. 1-5 - Ralph Spencer Poore

:
Access Control Using Attribute Certificates. 1-7 - Ben Rothke:

Should You Trust the NSA? 1-7 - Edward H. Freeman:

Director Liability in Computer Negligence Cases. 1-5 - Kelly J. Kuchta:

Computer Forensics Today. 1-5 - John R. Vacca:

The European Data Protection Directive: A Roadblock to International Trade? 1-10 - Frederick Gallegos:

Database Protection: Selected Legal and Technical Issues. 1-13
Volume 9, Number 2, 2000
- Jeffrey L. Ott:

Defining a Value Proposition for Information Security. 1-3 - Edward H. Freeman:

Freedom of Speech in Cyberspace: Intel v. Hamidi. 1-5 - Jim S. Tiller, Bryan D. Fish:

Packet Sniffers and Network Monitors. 1-8 - Bruce Murphy, Steve Schlarman, Rik Boren:

Enterprise Security Architecture. 1-14 - Al Holzinger:

Information Security Management and Assurance A Call to Action for Corporate Governance. 1-8 - Tim Clark:

Virtual Private Networks with QoS. 1-8 - Kelly J. Kuchta:

Building a Business Case for Computer Forensics. 1-5
Volume 9, Number 3, 2000
- Jeffrey L. Ott:

The Value Proposition of Information Security: Putting The Pieces In Place. 1-3 - Peter Stephenson:

Standards or Best Practices - Conflicting Interests. 1-6 - Ralph Spencer Poore

:
Privacy and the Value of Personal Data. 1-6 - Jim S. Tiller, Bryan D. Fish:

Packet Sniffers and Network Monitors, Part 2. 1-15 - Jonathan Chinitz:

Single Sign-On: Is It Really Possible? 1-14 - Farley Stewart:

Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues. 1-7
Volume 9, Number 4, 2000
- Jeffrey L. Ott:

Defining A Value Proposition For Information Security... The Complete Picture. 1-3 - Peter Stephenson:

Flying by the Seat of Our Pants. 1-5 - Edward H. Freeman:

Anonymity on the Internet: ACLU of Georgia v. Miller. 1-6 - Ralph Spencer Poore

:
Valuing Information Assets for Security Risk Management. 1-7 - Bryan T. Koch:

Enclaves: The Enterprise as an Extranet. 1-10 - John R. Vacca:

The Dangerous Precedent Set in the Use of Electronic Identifiers. 1-8 - David Goldman:

Introducing Windows 2000 Security: Features and Management. 1-9 - Ben Rothke:

The Growing Problem of Virus Hoaxes. 1-6
Volume 9, Number 5, 2000
- Jeffrey L. Ott:

Pity the Poor Hacker. 1-3 - Peter Stephenson:

It's a Strange, Strange, Strange, Strange World. 1-6 - Edward H. Freeman:

State Control of Unsolicited E-mail: State of Washington v. Heckel. 1-5 - Rich O'Hanley:

WebSec 2000. 1-2 - Ralph Spencer Poore

:
Computer Forensics and Privacy: At What Price Do We Police the Internet? 1-5 - H. Merrill Lynch:

Firewall Fundamentals. 1-11 - Kelly J. Kuchta:

What Happened? 1-5 - Gerald V. Post, Albert Kagan, Stephen P. Balogh:

Security Implications of Virus Management. 1-7 - Erik Safsten:

Five Keys to Protecting Your Organization's E-mail. 1-6 - Kurt Manske:

An Introduction to Social Engineering. 1-7
Volume 9, Number 6, 2001
- Jeffrey L. Ott:

It Takes More Than a Village. 1-3 - Peter Stephenson:

France and the Art of Intrusion Detection. 1-4 - Edward H. Freeman:

Internet Gripe Sites: Bally v. Faber. 1-5 - Susan D. Hansche:

Designing a Security Awareness Program: Part 1. 1-9 - Michael Erbschloe:

Lessons from Love Crimes. 1-9 - Glenn Miller:

Modems: The Unlocked Back Door. 1-5 - Matunda Nyanchama, Paul Sop:

Enterprise Security Management: Managing Complexity. 1-8 - Brad Oates:

Cyber Crime: How Technology Makes It Easy and What to Do About It. 1-6 - Ralph Spencer Poore

:
Information Security Techniques for Data Tracing. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














