Journal: Information Systems Security

Volume 13, Issue 2

2 -- 7Ken Dunham. Phishing Isn t So Sophisticated: Scary!
8 -- 12Edward H. Freeman. Digital Signatures and Electronic Contracts
13 -- 18Anton Chuvakin. Security Event Analysis through Correlation
19 -- 30Douglas G. Conorich. Monitoring Intrusion Detection Systems: From Data to Knowledge
31 -- 37Alec Main. Application Security: Building in Security during the Development Stage
38 -- 45Louisa Saunier. The Twelve Principles of Trusted Solutions
46 -- 55Alyson E. Beacham, Denise Johnson McManus. Recovery of Financial Services Firms in the World Trade Center, Post 9/11/01