- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V18N2.html
-
JISSec Volume 18, Number 2 (2022) contents
-
N2
-
JISSec Volume 18, Number 2
-
Volume 18, Number 1
-
This is JISSec Volume 18, Number 1 launch announcement
-
JISSec_V18N1_Gulati_p63_CI
-
Comparative Study of LSB and DWT based Steganography combined with Arnold Transformation for Image Security, by Shruti Gulati, Adil Bashir and Ajaz Hussain Mir ...
-
JISSec_V18N1_Mai_p25_CI
-
Free Trial with Annoyance Mechanism as an Optimal Strategy in Cybersecurity Software Offering, by Bin Mai and Kutsal Dogan - Cart Item
-
V18N1_Mai.html
-
-
JISSec_V18N1_White_p3_CI
-
Root Cause Analysis for Information Security Incidents: A Pedagogical Requirement, by Garry White and Jaymeen Shah - Cart Item
-
V18N1_White.html
-
-
V18N1_Editorial.pdf
-
JISSec Volume 18, Number 1 Editorial
-
V18N1_FrontMatter.pdf
-
JISSec Volume 18, Number 1 Front Matter
-
V18N1.html
-
JISSec Volume 18, Number 1 (2022) contents
-
N1
-
JISSec Volume 18, Number 1
-
V18
-
JISSec contents: Volume 18
-
Volume 17, Number 3
-
This is JISSec Volume 17, Number 3 launch announcement
-
N3
-
JISSec Volume 17, Number 3
-
JISSec_V17N3_Dhillon_p189_CI
-
Zoombombing: Hype and Reality, by Simran Dhillon - Cart Item
-
V17N3_Dhillon.html
-
-
JISSec_V17N3_Wadkar_p163_CI
-
A Framework for Secure Web Browsing, Using Trusted Platform Module (TPM), by Harshad S. Wadkar and Arun Mishra - Cart Item
-
V17N3_Wadkar.html
-
-
JISSec_V17N3_Babu_p145_CI
-
Cyber Security and Its Reality in Bangladesh: An Analysis of Existing Legal Frameworks, by Kudrat-E-Khuda Babu - Cart Item
-
V17N3_Babu.html
-
-
V17N3_Editorial.pdf
-
JISSec Volume 17, Number 3 Editorial
-
V17N3_FrontMatter.pdf
-
JISSec Volume 17, Number 3 Front Matter
-
V17N3.html
-
JISSec Volume 17, Number 3 (2021) contents
-
JISSec_V17N2_Mukhayer_p125_CI
-
The Implications of Social Media Use by Employees on Organizational Reputation and Productivity, by Duaa Mukhayer and Sophie Bennett - Cart Item
-
JISSec_V17N2_Ahmed_p103_CI
-
The Use of Social Engineering to Change Organizational Behavior toward Information Security in an Educational Institution, by Vikram Ahmed and Serina Al-Haddad ...
-
Volume 17, Number 2
-
This is JISSec Volume 17, Number 2 launch announcement
-
JISSec_V17N2_Monzelo_p81_CI
-
Information Security Awareness and Its Impact on the CISO's Responsibilities - A Study of the Portuguese Environment, by Pedro Monzelo and Sérgio Nunes - Cart ...
-
V17N2_Monzelo.html
-
-
V17N2_Editorial.pdf
-
JISSec Volume 17, Number 2 Editorial