researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
12
, Issue
6
2
--
6
Edward H. Freeman
.
Software Repossession: Electronic Self-Help
7
--
11
Ken Dunham
.
EICAR Test File Security Considerations
12
--
16
Anton Chuvakin
.
Monitoring IDS
17
--
23
Carl Endorf
.
Outsourcing Security: The Need, the Risks, the Providers, and the Process
24
--
32
Avi Chesla
.
Information Security: A Defensive Battle
33
--
38
Paul A. Henry
.
Protocol and Application Awareness: A New Trend or an Established Tradition?
39
--
45
Julio César Hernández Castro
,
José María Sierra
,
Arturo Ribagorda
.
Beware of the Security Software
46
--
57
G. Stevenson Smith
.
Recognizing and Preparing Loss Estimates from Cyber-Attacks
Volume
12
, Issue
5
2
--
4
Jim Tiller
.
The Business of Security
5
--
18
Felicia M. Nicastro
.
Security Patch Management
19
--
28
Harold Long
.
Effective Use of Consultants in Your Security Programs
29
--
41
George Sadlier
.
Storage Area Networks: An Information Security Perspective
42
--
51
Mark Thyer
.
Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security
52
--
67
Russ Neal
.
A Project Methodology for Disaster Recovery Testing in a Server Based Environment
Volume
12
, Issue
4
2
--
5
Rich O Hanley
.
A Little Neglect May Breed Mischief ...
6
--
11
Ralph Spencer Poore
.
Advances in Cryptography
12
--
16
Edward H. Freeman
.
Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State
17
--
18
Ben Rothke
.
Who Guards the Computer Security Guards?
19
--
28
Ken Dunham
.
The Trouble with Trojans
29
--
35
Steven Hofmeyr
.
A New Approach to Security: Learning from Immunology
36
--
40
Robert Garigue
,
Marc Stefaniu
.
Information Security Governance Reporting
41
--
49
Stephen C. Shih
,
H. Joseph Wen
.
Building E-Enterprise Security: A Business View
50
--
56
Peter Stephenson
.
A Structured Approach to Incident Postmortems
Volume
12
, Issue
3
2
--
3
Jeffrey L. Ott
.
The War on Words
4
--
8
Edward H. Freeman
.
Biometrics, Evidence, and Personal Privacy
9
--
16
Bruce A. Lobree
.
IT Security: A Tactical War
17
--
28
Ken Dunham
.
Evaluating Anti-Virus Software: Which Is Best?
29
--
38
Peter Stephenson
.
Structured Investigation of Digital Incidents in Complex Computing Environments
39
--
44
Judy D. Holmes
.
Will Big Brother Cause Your Company to Be Sued?
45
--
47
John Gordineer
.
Blended Threats: A New Era in Anti-Virus Protection
Volume
12
, Issue
2
2
--
4
Jeffrey L. Ott
.
An Application of Security
5
--
9
Edward H. Freeman
.
Privacy Notices under the Gramm - Leach - Bliley Act
11
--
15
Mark B. Desman
.
The KISS Principle
16
--
20
Ken Dunham
.
Four Reasons Why Klez Is Widespread
21
--
36
Sureerut Inmor
,
Vatcharaporn Esichaikul
,
Dentcho N. Batanov
.
A Security-Oriented Extension of the Object Model for the Development of an Information System
37
--
43
Landall J. Stoltenberg
.
Application Security: Have We Locked the Windows and Left the Door Open?
44
--
49
Matunda Nyanchama
,
Marc Stefaniu
.
Analyzing Enterprise Network Vulnerabilities
50
--
59
Todd Fitzgerald
.
The HIPAA Final Rule: What s Changed?
Volume
12
, Issue
1
2
--
4
Jeffrey L. Ott
.
The Real Cost of Computer Crime
5
--
9
Edward H. Freeman
.
Prosecution of Computer Virus Authors
10
--
16
Ken Dunham
.
Anna Kournikova Revealed
17
--
21
Steven Hofmeyr
.
Why Today s Security Technologies Are So Inadequate: History, Implications, and New Approaches
22
--
33
Ashish Garg
,
Jeffrey Curtis
,
Hilary Halper
.
The Financial Impact of IT Security Breaches: What Do Investors Think?
34
--
42
Thomas R. Peltier
.
Establishing Business Controls for Electronic Mail Communications
43
--
53
Todd Fitzgerald
.
HIPAA Security Rule 101: The Time to Act Is Now
54
--
56
Elizabeth M. Ferrarini
.
History of Best Practices Eases CareGroup s HIPAA Planning: Interview with Dr. John Halamka