default search action
Information Systems Security, Volume 12
Volume 12, Number 1, 2003
- Jeffrey L. Ott:
The Real Cost of Computer Crime. 2-4 - Edward H. Freeman:
Prosecution of Computer Virus Authors. 5-9 - Ken Dunham:
Anna Kournikova Revealed. 10-16 - Steven A. Hofmeyr:
Why Today's Security Technologies Are So Inadequate: History, Implications, and New Approaches. 17-21 - Ashish Garg, Jeffrey Curtis, Hilary Halper:
The Financial Impact of IT Security Breaches: What Do Investors Think? 22-33 - Thomas R. Peltier:
Establishing Business Controls for Electronic Mail Communications. 34-42 - Todd Fitzgerald:
HIPAA Security Rule 101: The Time to Act Is Now. 43-53 - Elizabeth M. Ferrarini:
History of Best Practices Eases CareGroup's HIPAA Planning: Interview with Dr. John Halamka. 54-56
Volume 12, Number 2, 2003
- Jeffrey L. Ott:
An Application of Security. 2-4 - Edward H. Freeman:
Privacy Notices under the Gramm - Leach - Bliley Act. 5-9 - Mark B. Desman:
The "KISS" Principle. 11-15 - Ken Dunham:
Four Reasons Why Klez Is Widespread. 16-20 - Sureerut Inmor, Vatcharaporn Esichaikul, Dentcho N. Batanov:
A Security-Oriented Extension of the Object Model for the Development of an Information System. 21-36 - Landall J. Stoltenberg:
Application Security: Have We Locked the Windows and Left the Door Open? 37-43 - Matunda Nyanchama, Marc Stefaniu:
Analyzing Enterprise Network Vulnerabilities. 44-49 - Todd Fitzgerald:
The HIPAA Final Rule: What's Changed? 50-59
Volume 12, Number 3, 2003
- Jeffrey L. Ott:
The War on Words. 2-3 - Edward H. Freeman:
Biometrics, Evidence, and Personal Privacy. 4-8 - Bruce A. Lobree:
IT Security: A Tactical War. 9-16 - Ken Dunham:
Evaluating Anti-Virus Software: Which Is Best? 17-28 - Peter Stephenson:
Structured Investigation of Digital Incidents in Complex Computing Environments. 29-38 - Judy D. Holmes:
Will Big Brother Cause Your Company to Be Sued? 39-44 - John Gordineer:
Blended Threats: A New Era in Anti-Virus Protection. 45-47
Volume 12, Number 4, 2003
- Rich O'Hanley:
"A Little Neglect May Breed Mischief ...". 2-5 - Ralph Spencer Poore:
Advances in Cryptography. 6-11 - Edward H. Freeman:
Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State. 12-16 - Ben Rothke:
Who Guards the Computer Security Guards? 17-18 - Ken Dunham:
The Trouble with Trojans. 19-28 - Steven A. Hofmeyr:
A New Approach to Security: Learning from Immunology. 29-35 - Robert Garigue, Marc Stefaniu:
Information Security Governance Reporting. 36-40 - Stephen C. Shih, H. Joseph Wen:
Building E-Enterprise Security: A Business View. 41-49 - Peter Stephenson:
A Structured Approach to Incident Postmortems. 50-56
Volume 12, Number 5, 2003
- Jim S. Tiller:
The Business of Security. 2-4 - Felicia M. Nicastro:
Security Patch Management. 5-18 - Harold Long:
Effective Use of Consultants in Your Security Programs. 19-28 - George Sadlier:
Storage Area Networks: An Information Security Perspective. 29-41 - Mark Thyer:
Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security. 42-51 - Russ Neal:
A Project Methodology for Disaster Recovery Testing in a Server Based Environment. 52-67
Volume 12, Number 6, 2004
- Edward H. Freeman:
Software Repossession: Electronic Self-Help. 2-6 - Ken Dunham:
EICAR Test File Security Considerations. 7-11 - Anton Chuvakin:
Monitoring IDS. 12-16 - Carl F. Endorf:
Outsourcing Security: The Need, the Risks, the Providers, and the Process. 17-23 - Avi Chesla:
Information Security: A Defensive Battle. 24-32 - Paul A. Henry:
Protocol and Application Awareness: A New Trend or an Established Tradition? 33-38 - Julio César Hernández Castro, José María Sierra, Arturo Ribagorda:
Beware of the Security Software. 39-45 - G. Stevenson Smith:
Recognizing and Preparing Loss Estimates from Cyber-Attacks. 46-57
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.