|
- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
JISSec_V4N3_Spagnoletti_p46_CI
-
The Duality of Information Security Management: Fighting against Predictable and Unpredictable Threats, by Paolo Spagnoletti and Andrea Resca - Cart Item
-
JISSec_V4N3_Davis_p24_CI
-
Incident Response Planning Using Collaboration Engineering Process Development and Validation, by Alanah J. Davis, Mehruz Kamal, Terrance V. Schoonover, Leah ...
-
JISSec_V4N3_VanDenEede_p3_CI
-
Organizational Learning for the Incident Management Process: Lessons from High Reliability Organizations, by Gerd Van Den Eede, Willem J. Muhren and Bartel Van ...
-
V4N3-Spagnoletti.html
-
The Duality of Information Security Management: Fighting against Predictable and Unpredictable Threats, by Paolo Spagnoletti and Andrea Resca
-
V4N3-Davis.html
-
Incident Response Planning Using Collaboration Engineering Process Development and Validation, by Alanah J. Davis, Mehruz Kamal, Terrance V. Schoonover, Leah ...
-
V4N3-VanDenEede.html
-
Organizational Learning for the Incident Management Process: Lessons from High Reliability Organizations, by Gerd Van Den Eede, Willem J. Muhren and Bartel Van ...
-
V4N3.html
-
JISSec Volume 4, Number 3 (2008) contents
-
Thanks
-
After purchase acknowledgments and instructions.
-
Volume 5, Number 2
-
This is JISSec Volume 5, Number 2 launch announcement
-
Volume 5, Number 1
-
This is JISSec Volume 5, Number 1 launch announcement
-
Volume 4, Number 3
-
This is JISSec Volume 4, Number 3 launch announcement
-
V4N2_Arnett.html
-
Book Review: Principles of Information Systems Security: Text & Cases, by Gurpreet Dhillon, Reviewed by Kirk P. Arnett
-
V4N2_White.html
-
Just Trying to Be Friendly: A Case Study in Social Engineering, by Doug White and Alan Rea
-
V4N2_Asghar.html
-
MILD DSS - Conceptual Architecture, Validation and Representation, by Sohail Asghar, Damminda Alahakoon and Leonid Churilov
-
V4N2_Altinkemer.html
-
Vulnerabilities and Patches of Open Source Software: An Empirical Study, by Kemal Altinkemer, Jackie Rees and Sanjay Sridhar
-
JISSec_V4N2_Arnett_p86_CI
-
Book Review: Principles of Information Systems Security: Text & Cases, by Gurpreet Dhillon, Reviewed by Kirk P. Arnett - Cart Item
-
JISSec_V4N2_White_p56_CI
-
Just Trying to Be Friendly: A Case Study in Social Engineering, by Doug White and Alan Rea - Cart Item
-
JISSec_V4N2_Asghar_p26_CI
-
MILD DSS - Conceptual Architecture, Validation and Representation, by Sohail Asghar, Damminda Alahakoon and Leonid Churilov - Cart Item
-
JISSec_V4N2_Altinkemer_p3_CI
-
Vulnerabilities and Patches of Open Source Software: An Empirical Study, by Kemal Altinkemer, Jackie Rees and Sanjay Sridhar - Cart Item
-
V4N2_Editorial.pdf
-
JISSec Volume 4, Number 2 Editorial
-
V4N2_FrontMatter.pdf
-
JISSec Volume 4, Number 2 Front Matter
-
V4N2.html
-
JISSec Volume 4, Number 2 (2008) contents
-
JISSec_V3N3_Sridhar_p51_CI
-
Challenges in Managing Information Security in Academic Institutions: Case of MDI in India, by Varadharajan Sridhar and D. K. Ahuja - Cart Item
-
V3N3.html
-
JISSec Volume 3, Number 3 (2007) contents
-
V3N3_Sridhar.html
-
Challenges in Managing Information Security in Academic Institutions: Case of MDI in India, by Varadharajan Sridhar and D. K. Ahuja
-
V4N1.html
-
JISSec Volume 4, Number 1 (2008) contents
-
V4N1_Jensen.html
-
Mitigating Consumer Perceptions of Privacy and Security Risks with the Use of Residual RFID Technologies through Governmental Trust, by Andrew S. Jensen, ...
-
V4N1_Surendra.html
-
The Ethics of IT Disaster Recovery Planning: Five Case Studies, by Nanda Surendra, A. Graham Peace and Daniel Connolly
-
V4N1_Hirsch.html
-
Perceptual and Cultural Aspects of Risk Management Alignment: a case study, by Corey Hirsch and Jean-Noël Ezingeard
-
V3N3_Tryfonas.html
-
On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development, by Theodore Tryfonas
|
|