default search action
Information Systems Security, Volume 8
Volume 8, Number 1, 1999
- Jeffrey L. Ott:
Preparing for the New Millennium. 3-5 - Peter Stephenson:
Information Warfare, or, Help! The Sky Is Falling! 6-10 - Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:
Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas? 11-14 - Ralph Spencer Poore:
Ethics and the Information Security Profession. 15-17 - A. Perry Schwartz, Mitchell A. Zalewski:
Assuring Data Security Integrity at Ford Motor Company. 18-26 - Philip Carden:
Public Key Infrastructure for Messaging Security. 27-32 - Robert Rudloff, Jamie Jabouri:
Preparing for Electronic Medical Records Legislation. 33-38 - Edward H. Freeman:
Cookies and Freedom of Information: The Putnam Pit Case. 39-44 - Ed Blackwell:
Building a Solid Foundation for Intranet Security. 45-53 - David Johnson:
Secure Access to Mission-Critical Applications. 54-63 - Janice C. Sipior, Burke T. Ward, Sebastian M. Rainone:
A Strategy for Ethical Management of E-mail Privacy. 64-72 - William A. Yarberry:
Telephony Security. 73-80
Volume 8, Number 2, 1999
- Jeffrey L. Ott:
Human Nature. 3-4 - Gilbert Held:
Employing Proxy Services. 5-9 - Peter Stephenson:
Hiring Hackers. 10-13 - Edward H. Freeman:
Webwrap and the Law of Contracts. 14-20 - Ben Rothke:
Government Mandated Key Escrow: A Bad Idea That Won't Go Away? 21-25 - Harry B. DeMaio:
Getting Started with PKI. 27-36 - Dahl Gerberick, Don Huber, Robert Rudloff:
Defining a Technical Architecture for Health Care Security. 37-49 - Frederick Gallegos, Mohammad Al-abdullah:
Selected Security and Legal Issues in E-Commerce. 50-57 - Carol A. Siegel:
Intrusion Detection: Making the Business Case. 58-68 - Caroline R. Hamilton:
Risk Management and Security. 69-78
Volume 8, Number 3, 1999
- Jeffrey L. Ott:
"Professionalism". 3-4 - Peter Stephenson:
Coming of Age. 5-9 - Edward H. Freeman:
Search and Seizure of Computer Equipment. 10-15 - Ralph Spencer Poore:
Anonymity, Privacy, and Trust. 16-20 - Steve Schlarman:
Meet Your Cracker Intrusion Management Using Criminal Profiling. 21-26 - Ralph Spencer Poore:
Release for Public Comment. 27-77
Volume 8, Number 4, 2000
- Jeffrey L. Ott:
The New Millennium. 1-3 - Peter Stephenson:
Where Is the IDS? 1-6 - Charlene A. Dykman, Cindy Cook, H. Van Tran:
A Guide to NetWare 5 Security and Control. 1-16 - John R. Vacca:
Encryption Keys: Randomness Is Key to Their Undoing. 1-6 - Frederick Gallegos:
Software Piracy: Some Facts, Figures, and Issues. 1-23 - Charanjit Singh, Mark N. Frolick:
Ibuttons: Building the Infrastructure for More Secure E-commerce. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.