- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V6
-
JISSec Volume 6 (2010)
-
V6.html
-
JISSec contents: Volume 6
-
JISSec_V6N1_Merhout_p55_CI
-
Book Review: Information Security Management Handbook, by Harold F. Tipton and Micki Krause, Reviewed by Jeffrey W. Merhout - Cart Item
-
JISSec_V6N1_Tsohou_p36_CI
-
Aligning Security Awareness with Information Systems Security Management, by Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis and Evangelos Kiountouzis - Cart ...
-
JISSec_V6N1_Aggelinos_p20_CI
-
Integrating Disaster Recovery Plan Activities into the System Development Life Cycle, by George Aggelinos and Sokratis Katsikas - Cart Item
-
JISSec_V6N1_Kalloniatis_p3_CI
-
PriS-Tool: A Case Tool for Privacy-Oriented Requirements Engineering, by Christos Kalloniatis, Evangelia Kavakli and Efstathios Kontelis - Cart Item
-
V6N1_Merhout.html
-
-
V6N1.html
-
JISSec Volume 6, Number 1 (2010) contents
-
V6N1_Editorial.pdf
-
JISSec Volume 6, Number 1 Editorial
-
V6N1_FrontMatter.pdf
-
JISSec Volume 6, Number 1 Front Matter
-
V6N1_Tsohou.html
-
-
N1
-
JISSec Volume 6, Number 1
-
V6N1_Aggelinos.html
-
-
V6N1_Kalloniatis.html
-
-
N4
-
JISSec Volume 5, Number 4
-
V5N4.html
-
JISSec Volume 5, Number 4 (2009) contents
-
JISSec_V5N4_Mu_p47_CI
-
Automatically Compute Information Flow Quantity via Probabilistic Semantics, by Chunyan Mu and David Clark - Cart Item
-
JISSec_V5N4_Descher_p27_CI
-
On Retaining Data Control to the Client in Infrastructure Clouds, by Marco Descher, Philip Masser, Thomas Feilhauer, David Huemer and A Min Tjoa - Cart Item
-
V5N4_Descher.html
-
-
JISSec_V5N4_Ahsant_p3_CI
-
Workflows in Dynamic and Restricted Delegation, by Mehran Ahsant and Jim Basney - Cart Item
-
V5N4_Ahsant.html
-
-
V5N4_Editorial.pdf
-
JISSec Volume 5, Number 4 Editorial
-
V5N4_FrontMatter.pdf
-
JISSec Volume 5, Number 4 Front Matter
-
V5N4_Mu.html
-
-
N3
-
JISSec Volume 5, Number 3
-
V5N3_Crossler.html
-
-
V5N3_Ingalsbe.html
-
-
V5N3_Mansour.html
-
-
V5N3_Editorial.pdf
-
JISSec Volume 5, Number 3 Editorial
-
V5N3_FrontMatter.pdf
-
JISSec Volume 5, Number 3 Front Matter