Abstract is missing.
- Elliptic curve for data protectionWasim A. Al-Hamdani. 1-14 [doi]
- Who can you trust in the cloud?: a review of security issues within cloud computingJohn C. Roberts II, Wasim A. Al-Hamdani. 15-19 [doi]
- PKI and access control in office environmentsChristopher Woodward, Wasim A. Al-Hamdani. 20-24 [doi]
- Measures to improve security in a microkernel operating systemDurga Vemuri, Wasim A. Al-Hamdani. 25-33 [doi]
- Increasing real-world security of user IDs and passwordsLarry Holt. 34-41 [doi]
- Is RFID technology secure and private?Rand A. Mahmood, Wasim A. Al-Hamdani. 42-49 [doi]
- The value of the CISSP certification for educators and professionalsCharles E. Frank, Laurie Werner. 50-53 [doi]
- Critical infrastructure security curriculum modulesGuillermo A. Francia III. 54-58 [doi]
- Maintaining balance between theory and practice in information security coursesSvetlana Peltsverger. 59-60 [doi]
- Undergraduate research in computer forensicsMary Devito, Christine Hofmeister, Michael Jochen, N. Paul Schembari. 61-68 [doi]
- Capstone, thesis, or practicum?: the state of the practice in IA educationJeffrey Livermore, Kathryn Baker, Virginia Krolczyk, Ann Saurbier. 69-73 [doi]
- Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoningZouheir Trabelsi. 74-83 [doi]
- Embedding security into visual programming coursesMyung Ah Park. 84-93 [doi]
- An investigation into iPod Touch generation 2Charles Yates, Lydia Ray, Jianhua Yang. 94-98 [doi]