You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

Document V18N2.html
JISSec Volume 18, Number 2 (2022) contents
Folder N2
JISSec Volume 18, Number 2
News Item Volume 18, Number 1
This is JISSec Volume 18, Number 1 launch announcement
Cart Item JISSec_V18N1_Gulati_p63_CI
Comparative Study of LSB and DWT based Steganography combined with Arnold Transformation for Image Security, by Shruti Gulati, Adil Bashir and Ajaz Hussain Mir ...
Cart Item JISSec_V18N1_Mai_p25_CI
Free Trial with Annoyance Mechanism as an Optimal Strategy in Cybersecurity Software Offering, by Bin Mai and Kutsal Dogan - Cart Item
Record V18N1_Mai.html
Cart Item JISSec_V18N1_White_p3_CI
Root Cause Analysis for Information Security Incidents: A Pedagogical Requirement, by Garry White and Jaymeen Shah - Cart Item
Record V18N1_White.html
File V18N1_Editorial.pdf
JISSec Volume 18, Number 1 Editorial
File V18N1_FrontMatter.pdf
JISSec Volume 18, Number 1 Front Matter
Document V18N1.html
JISSec Volume 18, Number 1 (2022) contents
Folder N1
JISSec Volume 18, Number 1
Folder V18
JISSec contents: Volume 18
News Item Volume 17, Number 3
This is JISSec Volume 17, Number 3 launch announcement
Folder N3
JISSec Volume 17, Number 3
Cart Item JISSec_V17N3_Dhillon_p189_CI
Zoombombing: Hype and Reality, by Simran Dhillon - Cart Item
Record V17N3_Dhillon.html
Cart Item JISSec_V17N3_Wadkar_p163_CI
A Framework for Secure Web Browsing, Using Trusted Platform Module (TPM), by Harshad S. Wadkar and Arun Mishra - Cart Item
Record V17N3_Wadkar.html
Cart Item JISSec_V17N3_Babu_p145_CI
Cyber Security and Its Reality in Bangladesh: An Analysis of Existing Legal Frameworks, by Kudrat-E-Khuda Babu - Cart Item
Record V17N3_Babu.html
File V17N3_Editorial.pdf
JISSec Volume 17, Number 3 Editorial
File V17N3_FrontMatter.pdf
JISSec Volume 17, Number 3 Front Matter
Document V17N3.html
JISSec Volume 17, Number 3 (2021) contents
Cart Item JISSec_V17N2_Mukhayer_p125_CI
The Implications of Social Media Use by Employees on Organizational Reputation and Productivity, by Duaa Mukhayer and Sophie Bennett - Cart Item
Cart Item JISSec_V17N2_Ahmed_p103_CI
The Use of Social Engineering to Change Organizational Behavior toward Information Security in an Educational Institution, by Vikram Ahmed and Serina Al-Haddad ...
News Item Volume 17, Number 2
This is JISSec Volume 17, Number 2 launch announcement
Cart Item JISSec_V17N2_Monzelo_p81_CI
Information Security Awareness and Its Impact on the CISO's Responsibilities - A Study of the Portuguese Environment, by Pedro Monzelo and Sérgio Nunes - Cart ...
Record V17N2_Monzelo.html
File V17N2_Editorial.pdf
JISSec Volume 17, Number 2 Editorial