Abstract is missing.
- Rethinking risk-based information securityHerbert J. Mattord. [doi]
- Managing data access and voice service for remote workersScott Joubert. [doi]
- Managing security from the perspective of the business executiveRandall Craig Reid, Arthur H. Gilbert. [doi]
- Security programming using Python: man-in-the-middle attacksRobin M. Snyder. [doi]
- Identification of process improvement methodologies with application in information securityBrian C. Boynton. [doi]
- Impact of daily computer usage on GUI usage analysisEric S. Imsand, John A. Hamilton Jr.. [doi]
- The autotelic propensity of types of hackersKevin S. Floyd, Susan J. Harrington, Prachi Hivale. [doi]
- The design and implementation of an automated security compliance toolkit: a pedagogical exerciseGuillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins. [doi]
- Take a close look at phishingDipti Patel, Xin Luo. [doi]
- InfoSec technology management of user space and services through security threat gatewaysErwin Louis Carrow. [doi]
- Digital forensics on the cheap: teaching forensics using open source toolsRichard D. Austin. [doi]
- VLabNet: the integrated design of hands-on learning in information security and networkingValerie J. H. Powell, Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, Ian W. Parker. [doi]
- Cyberinsurance: a risk management tool?Alison Hedrick. [doi]
- Questionable qualifications: an in-depth look at diploma millsTammy Alexander. [doi]
- Management of security policies for mobile devicesAndy Green. [doi]
- Endpoint security: managing USB-based removable devices with the advent of portable applicationsMichael Fabian. [doi]
- Teaching advanced network security concepts to high school students in a laboratory-based summer camp environmentWesley Spencer. [doi]
- Education organization baseline control protection and trusted level securityWasim A. Al-Hamdani. [doi]
- What do we know about biometrics authentication?Michelle Boatwright, Xin Luo. [doi]
- Introducing Python programming into the data communications and security coursesRobin M. Snyder. [doi]
- Network and database security: regulatory compliance, network, and database security-a unified process and goalErrol A. Blake. [doi]
- Teaching network risk assessment to online graduate studentsYan Bai, Wayne Summers, Edward Bosworth. [doi]
- Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet useErwin Louis Carrow. [doi]
- An examination of virtualization's role in contingency planningStephen C. Gay. [doi]
- Incorporating database security courseware into a database security classMário A. M. Guimarães, Meg Murray, Richard Austin. [doi]
- Credit card transaction securityJonathan M. Graefe, Laurel Lashley, Mário A. M. Guimarães, Eghosa Guodabia, Amol K. Gupta, David Henry, Richard Austin. [doi]
- The management of economic ramification of information and network security on an organizationGodwin Fumey-Nassah. [doi]
- Making molehills out of mountains: bringing security research to the classroomRichard G. Taylor. [doi]
- Covert computer and network communicationsRobert C. Newman. [doi]
- Network security: VoIP security on data network-a guideErrol A. Blake. [doi]
- SecurityCom: a multi-player game for researching and teaching information security teamsDouglas P. Twitchell. [doi]
- An undergraduate rootkit research project: How available? How hard? How dangerous?Michael Bowman, Heath D. Brown, Paul Pitt. [doi]