researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
7
, Issue
4
3
--
4
Jeffrey L. Ott
.
Twelve Months to Go - and Counting
5
--
8
Ralph Spencer Poore
.
CyberScams
9
--
12
Char Sample
.
A Comparison of RealSecure and NetRanger
13
--
16
Mark Blanke
,
Philip Carden
.
NT Security Questions and Answers
17
--
19
Philip Carden
.
Quantifying and Lowering Security Costs - Hard Dollars
20
--
26
Edward H. Freeman
.
Issues of Jurisdiction in Cyberspace
27
--
45
H. J. Jerry Schumacher
,
Sumit Ghosh
,
Tony S. Lee
.
Top Secret Traffic and the Public ATM Network Infrastructure
46
--
51
Edward H. Freeman
.
Attorney - Client Privilege and Electronic Data Transmission
52
--
59
Phillip Q. Maier
.
Implementing and Supporting Extranets
Volume
7
, Issue
3
3
--
4
Ralph Spencer Poore
.
As I See It ..
5
--
8
Heather Smartt
.
Top 10 Dial-In Security Mistakes
9
--
12
Charles Forsythe
.
A Half-Dozen Rules for Securing Your Web Application
13
--
15
Ralph Spencer Poore
.
Best Practices
16
--
17
Bill Stackpole
.
Thinking Right About Network Security
18
--
19
Ralph Spencer Poore
.
A review of: "Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998"
20
--
30
William H. Creech
.
Network Sniffer Attacks
31
--
43
Thomas R. Peltier
.
Information Classification
44
--
53
Clive Blatchford
.
Information Security, Business, and the Internet
54
--
65
David Cullinane
.
Electronic Commerce Security
66
--
79
Belden Menkus
.
Understanding Security and Audit Issues in Electronic Document Interchange
Volume
7
, Issue
2
1
--
16
Steven F. Blanding
.
Secured Connections to External Networks
1
--
6
Wynne S. Carvill
.
Management Use of Internal Audit to Assure Year 2000 Preparedness
1
--
3
Will Ozier
.
An Open Letter to the Profession
1
--
7
Christopher M. King
.
Internet Electronic Mail Security
1
--
9
Ed Blackwell
.
Building a Solid Foundation for Intranet Security
1
--
17
H. Van Tran
,
Cindy Cook
,
Charlene A. Dykman
.
A Comparison of Windows NT 4 and NetWare 4 Security Models
1
--
3
Ralph Spencer Poore
.
Editor's Edition
1
--
11
Carl B. Jackson
,
Donald Bromley
,
Sam L. Rubenstein
.
Continuity Planning and the Year 2000
Volume
7
, Issue
1
1
--
4
Ben Rothke
.
DES Is Dead! Long Live ????
1
--
5
Harold F. Tipton
.
Professional Certification - What's the Point?
1
--
5
Karl J. Flusche
.
Unlocking the Secrets of Computer Evidence: What Would Happen if I Pressed This Key?
1
--
9
Caroline R. Hamilton
.
New Trends in Risk Management
1
--
9
Douglas G. Conorich
.
UNIX Passwords
1
--
4
Karl J. Flusche
.
A Tale of Two Spies: The Outside Hacker and the Trusted Insider
1
--
9
Dennis A. Dallas
.
Electronic Commerce Security on the Internet
1
--
10
Steve Trolan
.
Extranet Security: What's Right for the Business?
1
--
4
Benjamin Wright
.
Web Certification: A Benchmark for Trustworthy Commerce
1
--
6
Karl J. Flusche
.
Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore!
1
--
2
Ralph Spencer Poore
.
Editor's Edition
1
--
5
Sarah Hewitt
.
Disclosure via the Internet: Electronic Delivery of Mandated Disclosure Documents
1
--
3
Ralph Spencer Poore
.
The Lowly Password