You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Cart Item JISSec_V8N2_Chowdhuri_p3_CI
Understanding Information Security, by Romilla Chowdhuri and Gurpreet Dhillon - Cart Item
Document V8.html
JISSec contents: Volume 8
Folder V8
JISSec Volume 8 (2012)
Document V8N1.html
JISSec Volume 8, Number 1 (2012) contents
Folder N1
JISSec Volume 8, Number 1
Cart Item JISSec_V8N1_Prakash_p43_CI
Risk-based Valuation of Investments in Information Security - A Combination Approach, by Punnet Prakash - Cart Item
Record V8N1_Prakash.html
Cart Item JISSec_V8N1_Whitman_p21_CI
Threats to Information Security Revisited, by Michael E. Whitman and Herbert J. Mattord - Cart Item
Record V8N1_Whitman.html
Cart Item JISSec_V8N1_Phelps_p3_CI
Information System Security: Self-Efficacy and Implementation Effectiveness, by Daniel C. Phelps, John N. Gathegi, Michael Workman and Misook Heo - Cart Item
Record V8N1_Phelps.html
File V8N1_Editorial.pdf
JISSec Volume 8, Number 1 Editorial
File V8N1_FrontMatter.pdf
JISSec Volume 8, Number 1 Front Matter
News Item Volume 8, Number 2
This is JISSec Volume 8, Number 2 launch announcement
News Item Volume 8, Number 1
This is JISSec Volume 8, Number 1 launch announcement
Cart Item JISSec_V7N3_Schmidt_p33_CI
Computer Forensics: Examining the Effectiveness of File Deletion, by Mark B. Schmidt and Michael J. Condon - Cart Ite,
Cart Item JISSec_V7N3_Chantawut_p17_CI
Statistical analysis of Snort alarms for a medium-sized network, by Kitti Chantawut and Bogdan Ghita - Cart Item
Record V7N3_Schmidt.html
Record V7N3_Chantawut.html
Cart Item JISSec_V7N3_Week_p2_CI
A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic, by John Week, Polina Ivanova, Sandy Week and Alexander McLeod - Cart Item
File V7N3_FrontMatter.pdf
JISSec Volume 7, Number 3 Front Matter
File V7N3_Editorial.pdf
JISSec Volume 7, Number 3 Editorial
Document V7N3.html
JISSec Volume 7, Number 3 (2011) contents
Folder N3
JISSec Volume 7, Number 3
Record V7N3_Week.html
Folder N2
JISSec Volume 7, Number 2
File V7N2_FrontMatter.pdf
JISSec Volume 7, Number 2 Front Matter
Record V7N2_Thambusamy.html
Cart Item JISSec_V7N2_Born_p27_CI
Detecting and Visualizing Domain-Based DNS Tunnels Through N-Gram Frequency Analysis, by Kenton Born and David A. Gustafson - Cart Item
Record V7N2_Martins.html