- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
JISSec_V8N2_Chowdhuri_p3_CI
-
Understanding Information Security, by Romilla Chowdhuri and Gurpreet Dhillon - Cart Item
-
V8.html
-
JISSec contents: Volume 8
-
V8
-
JISSec Volume 8 (2012)
-
V8N1.html
-
JISSec Volume 8, Number 1 (2012) contents
-
N1
-
JISSec Volume 8, Number 1
-
JISSec_V8N1_Prakash_p43_CI
-
Risk-based Valuation of Investments in Information Security - A Combination Approach, by Punnet Prakash - Cart Item
-
V8N1_Prakash.html
-
-
JISSec_V8N1_Whitman_p21_CI
-
Threats to Information Security Revisited, by Michael E. Whitman and Herbert J. Mattord - Cart Item
-
V8N1_Whitman.html
-
-
JISSec_V8N1_Phelps_p3_CI
-
Information System Security: Self-Efficacy and Implementation Effectiveness, by Daniel C. Phelps, John N. Gathegi, Michael Workman and Misook Heo - Cart Item
-
V8N1_Phelps.html
-
-
V8N1_Editorial.pdf
-
JISSec Volume 8, Number 1 Editorial
-
V8N1_FrontMatter.pdf
-
JISSec Volume 8, Number 1 Front Matter
-
Volume 8, Number 2
-
This is JISSec Volume 8, Number 2 launch announcement
-
Volume 8, Number 1
-
This is JISSec Volume 8, Number 1 launch announcement
-
JISSec_V7N3_Schmidt_p33_CI
-
Computer Forensics: Examining the Effectiveness of File Deletion, by Mark B. Schmidt and Michael J. Condon - Cart Ite,
-
JISSec_V7N3_Chantawut_p17_CI
-
Statistical analysis of Snort alarms for a medium-sized network, by Kitti Chantawut and Bogdan Ghita - Cart Item
-
V7N3_Schmidt.html
-
-
V7N3_Chantawut.html
-
-
JISSec_V7N3_Week_p2_CI
-
A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic, by John Week, Polina Ivanova, Sandy Week and Alexander McLeod - Cart Item
-
V7N3_FrontMatter.pdf
-
JISSec Volume 7, Number 3 Front Matter
-
V7N3_Editorial.pdf
-
JISSec Volume 7, Number 3 Editorial
-
V7N3.html
-
JISSec Volume 7, Number 3 (2011) contents
-
N3
-
JISSec Volume 7, Number 3
-
V7N3_Week.html
-
-
N2
-
JISSec Volume 7, Number 2
-
V7N2_FrontMatter.pdf
-
JISSec Volume 7, Number 2 Front Matter
-
V7N2_Thambusamy.html
-
-
JISSec_V7N2_Born_p27_CI
-
Detecting and Visualizing Domain-Based DNS Tunnels Through N-Gram Frequency Analysis, by Kenton Born and David A. Gustafson - Cart Item
-
V7N2_Martins.html
-