default search action
Information Systems Security, Volume 15
Volume 15, Number 1, 2006
- Jim S. Tiller:
The Lion and the Gazelle. 2-5 - Ken Dunham:
Money Mules: An Investigative View. 6-10 - Edward H. Freeman:
Wardriving: Unauthorized Access to Wi-Fi Networks. 11-15 - Art Gilliland:
Understanding the IM Security Threat. 16-20 - Sumit Dhar:
Securing and Hardening RedHat Linux. 21-30 - Tommy Ward:
Security of Backup Data. 31-34 - Bond Masuda:
Managing the Risks of Managed Security Services. 35-42 - Russ Neal:
Social Psychological Variables That Contribute to Resistance to Security Assessment Findings. 43-52
Volume 15, Number 2, 2006
- James S. Tiller:
Security Answers the Call. 2-4 - Ken Dunham:
The Problem with P2P. 5-8 - Darrell Epps, Scott Tanner, Carl Silva:
Can VoIP Secure Itself for the Next Technology Wave?: A Look at Assessing Vulnerability in a Converged Environment. 9-15 - Bogdan Materna:
Proactive Security for VoIP Networks. 16-21 - Kevin Curran, John Stephen Honan:
Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution. 22-41 - Xin Luo:
A Holistic Approach for Managing Spyware. 42-48 - Ramanan Ramanathan:
Thinking Beyond Security. 49-54
Volume 15, Number 3, 2006
- James S. Tiller:
Virtual Security: The New Security Tool? 2-4 - Edward H. Freeman:
Open Source Software and the SCO Litigation. 5-9 - J. Patrick Ravenel:
Effective Operational Security Metrics. 10-17 - Paul Chen:
E-Mail Archiving: Understanding the Reasons, Risks, and Rewards. 18-23 - Rebecca Herold:
Building an Effective Privacy Program. 24-35 - Zeinab Karake Shalhoub:
Content Analysis of Web Privacy Policies in the GCC Countries. 36-45 - Karim Toubba:
Employing Encryption to Secure Consumer Data. 46-54
Volume 15, Number 4, 2006
- Edward H. Freeman:
Gmail and Privacy Issues. 2-6 - John Kindervag:
The Five Myths of Wireless Security. 7-16 - Kevin Curran, Elaine Smyth:
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. 17-38 - Brian Hernacki:
Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do. 39-42 - Stuart C. K. So, John J. Liu:
Securing RFID Applications: Issues, Methods, and Controls. 43-50 - Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., Dorsey W. Morrow:
The Top Information Security Issues Facing Organizations: What Can Government Do to Help? 51-58
Volume 15, Number 5, 2006
- Ken Dunham:
MetaFisher: Next-Generation Bots and Phishing. 2-6 - Abe Kleinfeld:
Measuring Security. 7-12 - Thomas R. Peltier:
Social Engineering: Concepts and Solutions. 13-21 - Gerald V. Post, Albert Kagan:
Information Security Tradeoffs: The User Perspective. 22-29 - Elizabeth A. Nichols, Andrew Sudbury:
Implementing Security Metrics Initiatives. 30-38 - David M. Lynch:
Securing Against Insider Attacks. 39-47 - Alan Murphy:
Protecting Your Internal Resources with Intranet Application Firewalls. 48-53
Volume 15, Number 6, 2006
- Ken Dunham:
Year of the Rootkit. 2-6 - Edward H. Freeman:
Service of Process by Email. 7-11 - Tyson Macaulay:
Risk Conductors. 12-24 - Mohammad Talib, Francis Joseph Ogwu, Atawneh Samer:
A New Algorithm for Hiding Gray Images Using Blocks. 25-29 - Cezar Drugescu, Rafael Etges:
Maximizing the Return on Investment on Information Security Programs: Program Governance and Metrics. 30-40 - Richard G. Vedder:
Katrina's Gift: A Wake-Up Call for Improved Disaster Planning. 41-44 - Joseph A. Cazier, B. Dawn Medlin:
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times. 45-55 - Mark Ryan del Moral Talabis:
Honeynet Learning: Discovering Information Security. 56-63 - Jim Vandermeer:
Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees' email usage is not putting your company at risk. 64-75
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.