- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
JISSec_V9N1_Alpar_p23_CI
-
The Identity Crisis - Security, Privacy and Usability Issues in Identity Management, by Gergely Alpár, Jaap-Henk Hoepman and Johanneke Siljee - Cart Item
-
V9N1_Alpar.html
-
-
JISSec_V9N1_Pendegraft_p3_CI
-
User Attitudes Toward Password Security: Survey and Simulation, by Norman Pendegraft - Cart Item
-
V9N1_Pendegraft.html
-
-
V9N1.html
-
JISSec Volume 9, Number 1 (2013) contents
-
V9N1_Editorial.pdf
-
JISSec Volume 9, Number 1 Editorial
-
V9N1_FrontMatter.pdf
-
JISSec Volume 9, Number 1 Front Matter
-
V9.html
-
JISSec contents: Volume 9
-
N2
-
JISSec Volume 9, Number 2
-
N1
-
JISSec Volume 9, Number 1
-
V9
-
JISSec Volume 9 (2013)
-
Volume 10, Number 1
-
This is JISSec Volume 10, Number 1 launch announcement
-
Volume 8, Number 3
-
This is JISSec Volume 8, Number 3 launch announcement
-
V8N3.html
-
JISSec Volume 8, Number 3 (2012) contents
-
N3
-
JISSec Volume 8, Number 3
-
JISSec_V8N3_Luse_p29_CI
-
Employing Interactive Maps to Increase User Utilization of Visualization Mechanisms for Network Security, by Andy Luse, Brian Mennecke, Anthony Townsend and ...
-
V8N3_Luse.html
-
-
JISSec_V8N3_Ngugi_p3_CI
-
Biometric Keypad Reliability: Stability Of Typing Patterns and Authentication Accuracy, by Benjamin Ngugi, Dezhi Wu and Jonathan Frank - Cart Item
-
V8N3_Ngugi.html
-
-
V8N3_Editorial.pdf
-
JISSec Volume 8, Number 3 Editorial
-
V8N3_FrontMatter.pdf
-
JISSec Volume 8, Number 3 Front Matter
-
N2
-
JISSec Volume 8, Number 2
-
V8N2_FrontMatter.pdf
-
JISSec Volume 8, Number 2 Front Matter
-
V8N2.html
-
JISSec Volume 8, Number 2 (2012) contents
-
V8N2_Chowdhuri.html
-
-
JISSec_V8N2_Anandarajan_p43_CI
-
Online Identity Theft: A Longitudinal Study of Individual Threat-Response and Coping Behaviors, by Murugan Anandarajan, Narasimha Paravastu, Bay Arinze and ...
-
V8N2_Editorial.pdf
-
JISSec Volume 8, Number 2 Editorial
-
V8N2_Anandarajan.html
-
-
JISSec_V8N2_Harris_p19_CI
-
Managing Corporate Computer Crime and the Insider Threat: The Role of Cognitive Distortion Theory, by Mark A. Harris - Cart Item
-
V8N2_Harris.html
-