Journal: IJISP

Volume 2, Issue 1

1 -- 25Surya B. Yadav. SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks
26 -- 41June Wei, Randall C. Reid, Hongmei Zhang. Life Cycle Pattern Study of Malicious Codes
42 -- 53Taner Pirim, Tabitha L. James, Katherine Boswell, Brian J. Reithel, Reza Barkhi. An Empirical Investigation of an Individual s Perceived Need for Privacy and Security
54 -- 79Syed Naqvi. VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids
80 -- 90S. E. Kruck, Faye P. Teer. Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use