You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 773 items matching your search terms

Subscribe to an always-updated feed of these search terms

Record V17N1_Gonzalez.html
Cart Item JISSec_V17N1_White_p3_CI
Root Cause Analysis Quality Model for Corporate Security Breaches, by Garry L. White and Jaymeen Shah - Cart Item
File V17N1_Editorial.pdf
JISSec Volume 17, Number 1 Editorial
File V17N1_FrontMatter.pdf
JISSec Volume 17, Number 1 Front Matter
Folder N1
JISSec Volume 17, Number 1
Folder V17
JISSec contents: Volume 17
News Item Volume 16, Number 3
This is JISSec Volume 16, Number 3 launch announcement
Cart Item JISSec_V16N3_Mukthapuram_p179_CI
Understanding Cyber Espionage, by Vani Supriya Mukthapuram - Cart Item
Cart Item JISSec_V16N3_Marotta_p151_CI
Perspectives on the Relationship between Compliance and Cybersecurity, by Angelica Marotta and Stuart Madnick - Cart Item
Cart Item JISSec_V16N3_Dhillon_p139_CI
Interpreting Individual Values for Information Privacy and Security, by Simran Dhillon and Sérgio Nunes - Cart Item
Record V16N3_Dhillon.html
File V16N3_Editorial.pdf
JISSec Volume 16, Number 3 Editorial
File V16N3_FrontMatter.pdf
JISSec Volume 16, Number 3 Front Matter
Document V16N3.html
JISSec Volume 16, Number 3 (2020) contents
Folder N3
JISSec Volume 16, Number 3
News Item Volume 18, Number 3
This is JISSec Volume 18, Number 3 launch announcement
Record V18N3_Dhillon.html
Document V18N3.html
JISSec Volume 18, Number 3 (2022) contents
Cart Item JISSec_V20N2_Abdelhamid_p75_CI
Trust Me, I Am Accountable: Factors Influencing the Perception of Benefits of Blockchain Technology, by Mohamed Abdelhamid, Ruchi Isaac and Katja Crusius - ...
Document V19N3.html
JISSec Volume 19, Number 3 (2023) contents
Record V19N2_Dhillon.html
Record V17N1_Neto.html
Record V17N1_White.html
Document V17N1.html
JISSec Volume 17, Number 1 (2021) contents
Document V17.html
JISSec contents: Volume 17
Record V20N3_Li.html
Cart Item JISSec_V19N1_Majadi_p57_CI
Shill Bidding Detection in Real-Time across Multiple Online Auctions, by Nazia Majadi and Jarrod Trevathan - Cart Item
Record V19N1_Majadi.html
Cart Item JISSec_V18N3_Bell_p177_CI
The Condro Group Hack: Infiltrating InstantSSL.it - A Case Study, by Christopher Bell - Cart Item
Record V18N3_Bell.html