Journal: Information Systems Security

Volume 7, Issue 4

3 -- 4Jeffrey L. Ott. Twelve Months to Go - and Counting
5 -- 8Ralph Spencer Poore. CyberScams
9 -- 12Char Sample. A Comparison of RealSecure and NetRanger
13 -- 16Mark Blanke, Philip Carden. NT Security Questions and Answers
17 -- 19Philip Carden. Quantifying and Lowering Security Costs - Hard Dollars
20 -- 26Edward H. Freeman. Issues of Jurisdiction in Cyberspace
27 -- 45H. J. Jerry Schumacher, Sumit Ghosh, Tony S. Lee. Top Secret Traffic and the Public ATM Network Infrastructure
46 -- 51Edward H. Freeman. Attorney - Client Privilege and Electronic Data Transmission
52 -- 59Phillip Q. Maier. Implementing and Supporting Extranets

Volume 7, Issue 3

3 -- 4Ralph Spencer Poore. As I See It ..
5 -- 8Heather Smartt. Top 10 Dial-In Security Mistakes
9 -- 12Charles Forsythe. A Half-Dozen Rules for Securing Your Web Application
13 -- 15Ralph Spencer Poore. Best Practices
16 -- 17Bill Stackpole. Thinking Right About Network Security
18 -- 19Ralph Spencer Poore. A review of: "Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998"
20 -- 30William H. Creech. Network Sniffer Attacks
31 -- 43Thomas R. Peltier. Information Classification
44 -- 53Clive Blatchford. Information Security, Business, and the Internet
54 -- 65David Cullinane. Electronic Commerce Security
66 -- 79Belden Menkus. Understanding Security and Audit Issues in Electronic Document Interchange

Volume 7, Issue 2

1 -- 16Steven F. Blanding. Secured Connections to External Networks
1 -- 6Wynne S. Carvill. Management Use of Internal Audit to Assure Year 2000 Preparedness
1 -- 3Will Ozier. An Open Letter to the Profession
1 -- 7Christopher M. King. Internet Electronic Mail Security
1 -- 9Ed Blackwell. Building a Solid Foundation for Intranet Security
1 -- 17H. Van Tran, Cindy Cook, Charlene A. Dykman. A Comparison of Windows NT 4 and NetWare 4 Security Models
1 -- 3Ralph Spencer Poore. Editor's Edition
1 -- 11Carl B. Jackson, Donald Bromley, Sam L. Rubenstein. Continuity Planning and the Year 2000

Volume 7, Issue 1

1 -- 4Ben Rothke. DES Is Dead! Long Live ????
1 -- 5Harold F. Tipton. Professional Certification - What's the Point?
1 -- 5Karl J. Flusche. Unlocking the Secrets of Computer Evidence: What Would Happen if I Pressed This Key?
1 -- 9Caroline R. Hamilton. New Trends in Risk Management
1 -- 9Douglas G. Conorich. UNIX Passwords
1 -- 4Karl J. Flusche. A Tale of Two Spies: The Outside Hacker and the Trusted Insider
1 -- 9Dennis A. Dallas. Electronic Commerce Security on the Internet
1 -- 10Steve Trolan. Extranet Security: What's Right for the Business?
1 -- 4Benjamin Wright. Web Certification: A Benchmark for Trustworthy Commerce
1 -- 6Karl J. Flusche. Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore!
1 -- 2Ralph Spencer Poore. Editor's Edition
1 -- 5Sarah Hewitt. Disclosure via the Internet: Electronic Delivery of Mandated Disclosure Documents
1 -- 3Ralph Spencer Poore. The Lowly Password