Abstract is missing.
- Active learning approaches to teaching information assuranceChristy Chatmon, Hongmei Chi, Will Davis III. 1-7 [doi]
- Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timelineCory Q. Nguyen, James E. Goldman. 8-14 [doi]
- Is teaching with security in mind working?Svetlana Peltsverger, Orlando Karam. 15-20 [doi]
- Case studies for teaching physical security and security policyXiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu. 21-26 [doi]
- Preschool information assurance curriculum developmentBen Halpert. 27-28 [doi]
- Security education on a budget: getting the most "bang for the buck" with limited time and resourcesCrystal Edge, John W. Stamey. 29-35 [doi]
- Risk assessment of voting systems for teaching the art of information securityJeffrey P. Landry. 36-39 [doi]
- A cryptographic programming assignmentBen Setzer. 40 [doi]
- Teaching storage infrastructure management and securityVladan M. Jovanovic, Timur Mirzoev. 41-44 [doi]
- Using the Parkerian Hexad to introduce security in an information literacy classRandall C. Reid, Arthur H. Gilbert. 45-47 [doi]
- A primer on carrying out a successful yet rigorous security risk management based case studyHumayun Zafar. 48 [doi]
- Curriculum and pedagogical effects of the creation of a minor in cyber securityFrank H. Katz. 49-51 [doi]
- Designing a computer forensics concentration for cross-disciplinary undergraduate studentsHongmei Chi, Felecia Dix-Richardson, Deidre W. Evans. 52-57 [doi]
- Designing a graduate Capstone course for an online information assurance programJeffrey A. Livermore. 58-61 [doi]
- Database forensicsMário A. M. Guimarães, Richard Austin, Huwida Said. 62-65 [doi]
- Cryptography based access control in healthcare web systemsWasim A. Al-Hamdani. 66-79 [doi]
- XML security in healthcare web systemsWasim A. Al-Hamdani. 80-93 [doi]
- Online authentication: principles and practicesHerbert J. Mattord. 94 [doi]
- The enemy is still at the gates: threats to information security revisitedMichael E. Whitman, Herbert J. Mattord. 95-96 [doi]
- Threat based risk management in the federal sectorNathan Volk. 97-106 [doi]
- A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniquesRichard M. Schneider. 107-116 [doi]
- Cautionary tales from real world failures for managing security in the cyber worldBill Naber. 117-125 [doi]
- Integration questions: considerations that should be made when designing the specification of a software-based integrationWyatt Sweat. 126-130 [doi]
- Contingency planning and strategiesPhilip Clark. 131-140 [doi]
- Training general users on the non-policy side of the IS programHamza Amor. 141-144 [doi]
- Managing smart phone security risksMax Landman. 145-155 [doi]
- Practical investigations of digital forensics tools for mobile devicesMaynard Yates II. 156-162 [doi]
- Sworn to protect...implementing the security systems development life cycle into local law enforcementBrett W. Brubaker. 163-172 [doi]
- The smart grid.: the smart choice?Elena Meehan. 173-176 [doi]
- A forensic approach to incident responseTrevor Lamis. 177-185 [doi]