Journal: Information Systems Security

Volume 6, Issue 4

3 -- 5Ralph Spencer Poore. Editor's Edition
10 -- 21H. J. Jerry Schumacher, Sumit Ghosh. An Integrated Approach to Security on Demand in ATM Networks
22 -- 28Jeff Flynn. How to Trap the Network Intruder
29 -- 42Carey Nachenberg. Heuristics in the Fight against Computer Viruses
43 -- 54William Hugh Murray. Enterprise Security Architecture
55 -- 60Jim Kates. Security Testing Is Not All The Same: A Reference Taxonomy

Volume 6, Issue 3

3 -- 8Belden Menkus. Understanding the Denial of Service Threat
9 -- 19Gregory B. White, Eric A. Fisch, Udo W. Pooch. Government-Based Security Standards
20 -- 34Steven M. Bellovin. Network and Internet Security
35 -- 54David Ferbrache, Stuart Mort. Malicious Software and Hacking
55 -- 68Ronald A. Gove. An Overview of Modern Cryptography

Volume 6, Issue 2

3 -- 5Ralph Spencer Poore. Invisible Connections
6 -- 11Michael I. Sobol. Network Auditing Products
12 -- 27Bob Barnhart. An Object-Oriented Software Framework for Developing Trusted Intermediaries
28 -- 44Donald R. Richards. Biometric Identification
45 -- 55Gerald L. Kovacich. Information Warfare and the Information Systems Security Professional
56 -- 80Thomas Welch. Computer Crime Investigation and Computer Forensics

Volume 6, Issue 1

4 -- 9Harry B. DeMaio. Information Protection in the Law Office
10 -- 13Ralph Spencer Poore. Passwords: Obsolete Authenticators or Cutting Edge?
14 -- 19Donn B. Parker. Information Security in a Nutshell
20 -- 28Michael I. Sobol. Firewalls
29 -- 30Ralph Spencer Poore. Professional Certification
31 -- 44Carol A. Siegel. Electronic Commerce for Financial Institutions
45 -- 54Gary C. Kessler. The Internet Engineering Task ForceHistory, Background, and Security Guidelines
55 -- 63Lawrence D. Dietz. The Legal and Regulatory Environment of the Internet
64 -- 70Shane Coursen. The Financial Impact of Viruses