Abstract is missing.
- Campus-wide spyware and virus removal as a method of teaching information securityFrank H. Katz. 1-4 [doi]
- Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programsErik Hjelmås, Stephen D. Wolthusen. 5-12 [doi]
- Ethical hacking and password cracking: a pattern for individualized security exercisesRobin Snyder. 13-18 [doi]
- Secure software engineering teaching modulesJames Walden, Charles E. Frank. 19-23 [doi]
- Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculumBlair Taylor, Shiva Azadegan. 24-29 [doi]
- Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculumJanine DeWitt, Cynthia Della Torre Cicalese. 30-40 [doi]
- Incorporating certification and accreditation coursework into network security curriculumGerald Clevenger. 41-43 [doi]
- Is attack better than defense?: teaching information security the right wayMartin Mink, Felix C. Freiling. 44-48 [doi]
- Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192Michael E. Whitman, Herbert J. Mattord. 49-51 [doi]
- Knowledge flow with information assurance trackWasim A. Al-Hamdani. 52-57 [doi]
- Information security and computer systems: an integrated approachMark A. Holliday, William C. Kreahling. 58-63 [doi]
- New challenges in teaching database securityMario Guimaraes. 64-67 [doi]
- Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilitiesRobert C. Newman. 68-78 [doi]
- Some security alternatives for encrypting information on storage devicesRobin Snyder. 79-84 [doi]
- Steganography obliterator: an attack on the least significant bitsGuillermo A. Francia III, Tyler S. Gomez. 85-91 [doi]
- Combining an e-commerce simulation with a cyber-survivor exerciseRobin Snyder. 92-95 [doi]
- Visualization and management of digital forensics dataGuillermo A. Francia III, Monica Trifas, Dorothy Brown, Rahjima R. Francia, Chrissy Scott. 96-101 [doi]
- Assessment of need and method of delivery for information security awareness programWasim A. Al-Hamdani. 102-108 [doi]
- Encouraging good passwordsChlotia Posey Garrison. 109-112 [doi]
- Domain name registrars: are they part of the domain name fraud problem?Tammy Alexander. 113-117 [doi]
- LAN attacker: a visual education toolThomas Baxley, Jinsheng Xu, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse. 118-123 [doi]
- The effect of computer self-efficacy on security training effectivenessRobert E. Crossler, France Belanger. 124-129 [doi]
- A year affair with security: the development of a security program and managerLaurence Holt. 130-135 [doi]
- A review of spyware campaigns and strategies to combat themAnne M. Payton. 136-141 [doi]
- FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operationsPeter Phuong Vo, Chau Maggie Vo. 142-146 [doi]
- The storm ahead: how CALEA will turn VoIP on its headJason Hill. 147-150 [doi]
- Law and privacy: the debate over Radio Frequency Identification (RFID) legislationCameron Jordan. 151 [doi]
- The other side of identity theft: not just a financial concernKim Luong. 152-155 [doi]
- Information security: examining and managing the insider threatMichael D. Carroll. 156-158 [doi]
- Managing phishing threats in an organizationCharles Ohaya. 159-161 [doi]
- Data security breach: seeking a prescription for adequate remedyAnne M. Payton. 162-167 [doi]
- Criminal computer forensics managementRay Yeager. 168-174 [doi]
- Corporate management of computer forensics evidenceJames William Rust. 175-178 [doi]
- The management of access controls/biometrics in organizationsErrol A. Blake. 179-183 [doi]
- Engaging undergraduates in computer security researchJohn B. Bowles, Caroline M. Eastman, Csilla Farkas. 184-190 [doi]
- Social engineering in information assurance curriculaDouglas P. Twitchell. 191-193 [doi]
- A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development modelJohn C. Beachboard, Alma Cole, Mike Mellor, Steven Hernandez, Kregg Aytes, Nelson Massad. 194-196 [doi]
- Teaching students to hack: ethical implications in teaching students to hack at the university levelBrian A. Pashel. 197-200 [doi]
- Ethical hacking as a risk management techniqueSyed A. Saleem. 201-203 [doi]