researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
8
, Issue
4
1
--
3
Jeffrey L. Ott
.
The New Millennium
1
--
6
John R. Vacca
.
Encryption Keys: Randomness Is Key to Their Undoing
1
--
23
Frederick Gallegos
.
Software Piracy: Some Facts, Figures, and Issues
1
--
6
Peter Stephenson
.
Where Is the IDS?
1
--
8
Charanjit Singh
,
Mark N. Frolick
.
Ibuttons: Building the Infrastructure for More Secure E-commerce
1
--
16
Charlene A. Dykman
,
Cindy Cook
,
H. Van Tran
.
A Guide to NetWare 5 Security and Control
Volume
8
, Issue
3
3
--
4
Jeffrey L. Ott
.
Professionalism
5
--
9
Peter Stephenson
.
Coming of Age
10
--
15
Edward H. Freeman
.
Search and Seizure of Computer Equipment
16
--
20
Ralph Spencer Poore
.
Anonymity, Privacy, and Trust
21
--
26
Steve Schlarman
.
Meet Your Cracker Intrusion Management Using Criminal Profiling
27
--
77
Ralph Spencer Poore
.
Release for Public Comment
Volume
8
, Issue
2
3
--
4
Jeffrey L. Ott
.
Human Nature
5
--
9
Gilbert Held
.
Employing Proxy Services
10
--
13
Peter Stephenson
.
Hiring Hackers
14
--
20
Edward H. Freeman
.
Webwrap and the Law of Contracts
21
--
25
Ben Rothke
.
Government Mandated Key Escrow: A Bad Idea That Won t Go Away?
27
--
36
Harry Demaio
.
Getting Started with PKI
50
--
57
Frederick Gallegos
,
Mohammad Al-abdullah
.
Selected Security and Legal Issues in E-Commerce
58
--
68
Carol A. Siegel
.
Intrusion Detection: Making the Business Case
69
--
78
Caroline R. Hamilton
.
Risk Management and Security
Volume
8
, Issue
1
3
--
5
Jeffrey Ott
.
Preparing for the New Millennium
6
--
10
Peter Stephenson
.
Information Warfare, or, Help! The Sky Is Falling!
11
--
14
Michael E. Whitman
,
Anthony M. Townsend
,
Robert J. Aalberts
.
Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas?
15
--
17
Ralph Spencer Poore
.
Ethics and the Information Security Profession
18
--
26
A. Perry Schwartz
,
Mitchell A. Zalewski
.
Assuring Data Security Integrity at Ford Motor Company
27
--
32
Philip Carden
.
Public Key Infrastructure for Messaging Security
39
--
44
Edward H. Freeman
.
Cookies and Freedom of Information: The Putnam Pit Case
45
--
53
Ed Blackwell
.
Building a Solid Foundation for Intranet Security
54
--
63
David Johnson
.
Secure Access to Mission-Critical Applications
64
--
72
Janice C. Sipior
,
Burke T. Ward
,
Sebastian M. Rainone
.
A Strategy for Ethical Management of E-mail Privacy
73
--
80
William Yarberry
.
Telephony Security