Journal: Information Systems Security

Volume 12, Issue 5

2 -- 4Jim Tiller. The Business of Security
5 -- 18Felicia M. Nicastro. Security Patch Management
19 -- 28Harold Long. Effective Use of Consultants in Your Security Programs
29 -- 41George Sadlier. Storage Area Networks: An Information Security Perspective
42 -- 51Mark Thyer. Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security
52 -- 67Russ Neal. A Project Methodology for Disaster Recovery Testing in a Server Based Environment