researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
6
, Issue
4
1
--
0
Chez Ciechanowicz
.
Introduction
12
--
17
Andy Nikishin
.
Red Alert
18
--
30
Igor Muttik
.
Pick'n'mix comparative tests
58
--
64
Sami Rautiainen
.
Travelling with Linux malware: Is Linux security for real?
65
--
78
Katrin Tocheva
.
Worm's Fashion Salon
79
--
82
Sarah Gordon
.
The Virus Writer and The Reporter
Volume
6
, Issue
3
1
--
0
Chez Ciechanowicz
.
Introduction
12
--
18
J. Stuart Broderick
.
Information Security Risk Management - When Should It be Managed?
19
--
27
Jonathan Tregear
.
Risk Assessment
28
--
36
Luis Navarro
.
Information Security Risks and Managed Security Service
37
--
44
Lech J. Janczewski
.
Handling Distributed Denial-of-Service Attacks
45
--
53
Rob Dodson
.
Information Incident Management
54
--
59
David Teneyuca
.
Organizational Leader's Use Of Risk Management for Information Technology
60
--
70
Paul Williams
.
Information Security Governance
Volume
6
, Issue
2
1
--
0
Chez Ciechanowicz
.
Introduction
12
--
20
Paul J. G. Lothian
,
Peter Wenham
.
Database Security in a Web Environment
21
--
29
Carlo Bellettini
,
Elisa Bertino
,
Elena Ferrari
.
Role Based Access Control Models
30
--
43
Simon Wiseman
.
Database Security: Retrospective and Way Forward
44
--
58
Elisa Bertino
,
Barbara Carminati
,
Elena Ferrari
.
XML security
59
--
68
Vijay Atluri
.
Security for Workflow Systems
69
--
79
Sushil Jajodia
,
Duminda Wijesekera
.
Security in Federated Database Systems
80
--
94
Mary Ann Davidson
.
Security for eBusiness
95
--
102
Bhavani M. Thuraisingham
.
Security for Distributed Databases
Volume
6
, Issue
1
1
--
0
Chez Ciechanowicz
.
Introduction
15
--
22
Perry B. Gentry
.
What is a VPN?
23
--
30
J. Stuart Broderick
.
Implementing Virtual Private Networks in Today's Organization
31
--
34
J. Stuart Broderick
.
VPN Security Policy
35
--
48
Neil Dunbar
.
IPsec Networking Standards - An Overview
49
--
64
Samantha Donovan
,
Peter Drabwell
,
Rae Harbird
.
VPNs and Lightweight Clients
65
--
76
William Box
,
Keith Sterling
.
Enabling the User: The VPN in Context
77
--
94
Georgina Schäfer
.
Placement of Intelligence Within Networks to Provide Corporate VPN Services