- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V7N2_Editorial.pdf
-
JISSec Volume 7, Number 2 Editorial
-
JISSec_V7N2_Thambusamy_p49_CI
-
Design of a Secure Electronic Medical Records Process Using Secure Activity Resource Coordination, by Ravi Thambusamy and Rahul Singh - Cart Item
-
V7N2_Born.html
-
-
JISSec_V7N2_Martins_p15_CI
-
Comparing the Effectiveness of Antispyware Removal Tools, by W. Martins and S. M. Furnell - Cart Item
-
JISSec_V7N2_Nohlberg_p3_CI
-
A Conceptual Model of Social Engineering, by Marcus Nohlberg, Benkt Wangler and Stewart Kowalski - Cart Item
-
V7N2_Nohlberg.html
-
-
V7N2.html
-
JISSec Volume 7, Number 2 (2011) contents
-
V7.html
-
JISSec contents: Volume 7
-
V7N1.html
-
JISSec Volume 7, Number 1 (2011) contents
-
JISSec_V7N1_Pant_p48_CI
-
Tutorial - Certainly Verifiable Cryptography Using the Verifiable Uncertainty of Quantum Physics: A Primer on Quantum Key Distribution (QKD), by Vik Pant and ...
-
V7N1_Pant.html
-
-
JISSec_V7N1_Posey_p24_CI
-
When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse, by Clay Posey, Rebecca J. Bennett, Tom L. ...
-
V7N1_Posey.html
-
-
JISSec_V7N1_Jansen_p3_CI
-
Research Directions in Security Metrics, by Wayne Jansen - Cart Item
-
V7N1_Jansen.html
-
-
V7N1_Editorial.pdf
-
JISSec Volume 7, Number 1 Editorial
-
V7N1_FrontMatter.pdf
-
JISSec Volume 7, Number 1 Front Matter
-
N4
-
JISSec Volume 6, Number 4
-
N1
-
JISSec Volume 7, Number 1
-
V7
-
JISSec Volume 7 (2011)
-
Volume 7, Number 3
-
This is JISSec Volume 7, Number 3 launch announcement
-
V6N4.html
-
JISSec Volume 6, Number 4 (2010) contents
-
JISSec_V6N4_Ahlfeldt_p71_CI
-
Patient Safety and Patient Privacy in Information Security from the patient's view: A Case Study, by Rose-Mharie Åhlfeldt and Eva Söderström - Cart Item
-
JISSec_V6N4_Cazier_p53_CI
-
Password Collection through Social Engineering: An Analysis of a Simulated Attack, by Joseph A. Cazier and Christopher M. Botelho - Cart Item
-
JISSec_V6N4_Taeha_p20_CI
-
Economic Analysis of Digital Rights Management for Software Updates, by Taeha Kim and Alexander Talalayevsky - Cart Item
-
JISSec_V6N4_Thomson_p3_CI
-
Information Security Conscience: a precondition to an Information Security Culture?, by Kerry-Lynn Thomson - Cart Item
-
V6N4_Ahlfeldt.html
-
-
V6N4_Cazier.html
-
-
V6N4_Taeha.html
-
-
V6N4_Editorial.pdf
-
JISSec Volume 6, Number 4 Editorial