Journal: Inf. Sec. Techn. Report

Volume 6, Issue 4

1 -- 0Chez Ciechanowicz. Introduction
12 -- 17Andy Nikishin. Red Alert
18 -- 30Igor Muttik. Pick'n'mix comparative tests
58 -- 64Sami Rautiainen. Travelling with Linux malware: Is Linux security for real?
65 -- 78Katrin Tocheva. Worm's Fashion Salon
79 -- 82Sarah Gordon. The Virus Writer and The Reporter

Volume 6, Issue 3

1 -- 0Chez Ciechanowicz. Introduction
12 -- 18J. Stuart Broderick. Information Security Risk Management - When Should It be Managed?
19 -- 27Jonathan Tregear. Risk Assessment
28 -- 36Luis Navarro. Information Security Risks and Managed Security Service
37 -- 44Lech J. Janczewski. Handling Distributed Denial-of-Service Attacks
45 -- 53Rob Dodson. Information Incident Management
54 -- 59David Teneyuca. Organizational Leader's Use Of Risk Management for Information Technology
60 -- 70Paul Williams. Information Security Governance

Volume 6, Issue 2

1 -- 0Chez Ciechanowicz. Introduction
12 -- 20Paul J. G. Lothian, Peter Wenham. Database Security in a Web Environment
21 -- 29Carlo Bellettini, Elisa Bertino, Elena Ferrari. Role Based Access Control Models
30 -- 43Simon Wiseman. Database Security: Retrospective and Way Forward
44 -- 58Elisa Bertino, Barbara Carminati, Elena Ferrari. XML security
59 -- 68Vijay Atluri. Security for Workflow Systems
69 -- 79Sushil Jajodia, Duminda Wijesekera. Security in Federated Database Systems
80 -- 94Mary Ann Davidson. Security for eBusiness
95 -- 102Bhavani M. Thuraisingham. Security for Distributed Databases

Volume 6, Issue 1

1 -- 0Chez Ciechanowicz. Introduction
15 -- 22Perry B. Gentry. What is a VPN?
23 -- 30J. Stuart Broderick. Implementing Virtual Private Networks in Today's Organization
31 -- 34J. Stuart Broderick. VPN Security Policy
35 -- 48Neil Dunbar. IPsec Networking Standards - An Overview
49 -- 64Samantha Donovan, Peter Drabwell, Rae Harbird. VPNs and Lightweight Clients
65 -- 76William Box, Keith Sterling. Enabling the User: The VPN in Context
77 -- 94Georgina Schäfer. Placement of Intelligence Within Networks to Provide Corporate VPN Services