Journal: Information Systems Security

Volume 15, Issue 1

2 -- 5Jim Tiller. The Lion and the Gazelle
6 -- 10Ken Dunham. Money Mules: An Investigative View
11 -- 15Edward H. Freeman. Wardriving: Unauthorized Access to Wi-Fi Networks
16 -- 20Art Gilliland. Understanding the IM Security Threat
21 -- 30Sumit Dhar. Securing and Hardening RedHat Linux
31 -- 34Tommy Ward. Security of Backup Data
35 -- 42Bond Masuda. Managing the Risks of Managed Security Services
43 -- 52Russ Neal. Social Psychological Variables That Contribute to Resistance to Security Assessment Findings