You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Document V5N3.html
JISSec Volume 5, Number 3 (2009) contents
Cart Item JISSec_V5N3_Ingalsbe_p42_CI
Threat Modeling the Enterprise, by Jeffrey A. Ingalsbe, Dan Shoemaker, Nancy R. Mead and Antonio Drommi - Cart Item
Cart Item JISSec_V5N3_Mansour_p23_CI
Consideration of Risks and Internal Controls in Business Process Modelling, by Rosalyn Mansour and Uday S. Murthy - Cart Item
Cart Item JISSec_V5N3_Crossler_p3_CI
The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage, by Robert E. Crossler and ...
Record V5N2_Goodall.html
Cart Item JISSec_V5N2_Luse_p26_CI
Addressing Internal Security Threats with Roaming User-Based Distributed Firewalls, by Andy Luse; Kevin P. Scheibe and Anthony M. Townsend - Cart Item
Record V5N2_Luse.html
Folder N2
JISSec Volume 5, Number 2
Cart Item JISSec_V5N2_Goodall_p42_CI
Supporting Intrusion Detection Work Practice, by John R. Goodall; Wayne G. Lutters and Anita Komlodi - Cart Item
Cart Item JISSec_V5N2_Angell_p3_CI
The Risk of Computerised Bureaucracy, by Ian O. Angell and Spyridon Samonas - Cart Item
Record V5N2_Angell.html
Document V5N2.html
JISSec Volume 5, Number 2 (2009) contents
File V5N2_Editorial.pdf
JISSec Volume 5, Number 2 Editorial
File V5N2_FrontMatter.pdf
JISSec Volume 5, Number 2 Front Matter
News Item Volume 5, Number 4
This is JISSec Volume 5, Number 4 launch announcement
Cart Item JISSec_V5N1_Cumbie_p61_CI
An Exploratory Delphi Study among Small Business Executives on Adoption of Disaster Recovery Practices, by Barry A. Cumbie; Casey G. Cegielski and Chetan S. ...
Document V5.html
JISSec contents: Volume 5
Cart Item JISSec_V5N1_Skipper_p32_CI
Top Management Support, External and Internal Organizational Collaboration, and Organizational Flexibility in Preparation for Extreme Events, by Joseph B. ...
Folder N1
JISSec Volume 5, Number 1
Cart Item JISSec_V5N1_Borne_p3_CI
Mitigating Disaster: Improvising Information Technology in Response to Extreme Events, by John C. Borne and Suzanne D. Pawlowski - Cart Item
Document V5N1.html
JISSec Volume 5, Number 1 (2009) contents
File V5N1_Editorial.pdf
JISSec Volume 5, Number 1 Editorial
File V5N1_FrontMatter.pdf
JISSec Volume 5, Number 1 Front Matter
Record V5N1_Cumbie.html
Record V5N1_Skipper.html
Folder V5
JISSec Volume 5 (2009)
Record V5N1_Borne.html
News Item Volume 5, Number 3
This is JISSec Volume 5, Number 3 launch announcement
File V4N3_FrontMatter.pdf
JISSec Volume 4, Number 3 Front Matter
File V4N3_Editorial.pdf
JISSec Volume 4, Number 3 Editorial