Journal: Information Systems Security

Volume 12, Issue 2

2 -- 4Jeffrey L. Ott. An Application of Security
5 -- 9Edward H. Freeman. Privacy Notices under the Gramm - Leach - Bliley Act
11 -- 15Mark B. Desman. The KISS Principle
16 -- 20Ken Dunham. Four Reasons Why Klez Is Widespread
21 -- 36Sureerut Inmor, Vatcharaporn Esichaikul, Dentcho N. Batanov. A Security-Oriented Extension of the Object Model for the Development of an Information System
37 -- 43Landall J. Stoltenberg. Application Security: Have We Locked the Windows and Left the Door Open?
44 -- 49Matunda Nyanchama, Marc Stefaniu. Analyzing Enterprise Network Vulnerabilities
50 -- 59Todd Fitzgerald. The HIPAA Final Rule: What s Changed?