|
- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
JISSec_V2N3_Cazier_p69_CI
-
How Secure is Your Password? An Analysis of E-Commerce Passwords and their Crack Times, by Joseph A. Cazier and B. Dawn Medlin - Cart Item
-
JISSec_V2N3_Halonen_p49_CI
-
Building User Authentication in An Inter-Organisational Information System, by Raija Halonen - Cart Item
-
JISSec_V2N3_McFadzean_p3_CI
-
Anchoring Information Security Governance Research: Sociological Groundings and Future Directions, by Elspeth McFadzean, Jean-Noël Ezingeard and David Birchall ...
-
V2N3_Editorial.pdf
-
JISSec Volume 2, Number 3 Editorial
-
V2N3_FrontMatter.pdf
-
JISSec Volume 2, Number 3 Front Matter
-
V2N3.html
-
JISSec Volume 2, Number 3 (2006) contents
-
V2N3_Cazier.html
-
How Secure is Your Password? An Analysis of E-Commerce Passwords and their Crack Times, by Joseph A. Cazier and B. Dawn Medlin
-
V2N3_Halonen.html
-
Building User Authentication in An Inter-Organisational Information System, by Raija Halonen
-
V2N3_McFadzean.html
-
Anchoring Information Security Governance Research: Sociological Groundings and Future Directions, by Elspeth McFadzean, Jean-Noël Ezingeard and David Birchall
-
V3N1_Ye.html
-
An Evaluation of Size-based Traffic Feature for Intrusion Detection, by Ming Ye, G. Premkumar and Dan Zhu
-
V2N2.html
-
JISSec Volume 2, Number 2 (2006) contents
-
V2N2_Weistroffer.html
-
Book Review: The Executive Guide to Information Security: Threats, Challenges, and Solutions, by Mark Egan with Tim Mather, Reviewed by Roland Weistroffer
-
V2N2_Dhillon.html
-
To opt-in, or to opt-out? That is the question. A Case Study, by Gurpreet Dhillon and Scott Chapman
-
V2N2_Goel.html
-
Managing Information Security: Demystifying the Audit Process for Security Officers, by Sanjay Goel, Damira Pon and Jack Menzies
-
JISSec_V2N2_Weistroffer_p56_CI
-
Book Review: The Executive Guide to Information Security: Threats, Challenges, and Solutions, by Mark Egan with Tim Mather, Reviewed by Roland Weistroffer - ...
-
JISSec_V2N2_Dhillon_p46_CI
-
To opt-in, or to opt-out? That is the question. A Case Study, by Gurpreet Dhillon and Scott Chapman - Cart Item
-
JISSec_V2N2_Goel_p25_CI
-
Managing Information Security: Demystifying the Audit Process for Security Officers, by Sanjay Goel, Damira Pon and Jack Menzies - Cart Item
-
JISSec_V2N2_Morin_p15_CI
-
Towards a Global Framework for Corporate and Enterprise Digital Policy Management, by Jean-Henry Morin and Michel Pawlak - Cart Item
-
JISSec_V2N2_Backhouse_p3-CI
-
Rating Certificate Authorities: A Market Approach to the Lemons Problem, by James Backhouse, Joao Baptista and Carol Hsu - Cart Item
-
V2N2_Morin.html
-
Towards a Global Framework for Corporate and Enterprise Digital Policy Management, by Jean-Henry Morin and Michel Pawlak
-
V2N2_Editorial.pdf
-
JISSec Volume 2, Number 2 Editorial
-
V2N2_FrontMatter.pdf
-
JISSec Volume 2, Number 2 Front Matter
-
V2N2_Backhouse.html
-
Rating Certificate Authorities: A Market Approach to the Lemons Problem, by James Backhouse, Joao Baptista and Carol Hsu
-
V2N1.html
-
JISSec Volume 2, Number 1 (2006) contents
-
V2N1_Korzyk.html
-
A Conceptual Model for Integrative Information Systems Security, by Alexander D. Korzyk, John W. Sutherland and Heinz Roland Weistroffer
-
V2N1_Muntermann.html
-
Security Issues And Capabilities of Mobile Brokerage Services and Infrastructures, by Jan Muntermann and Heiko RoBnagel
-
JISSec_V2N1_Korzyk_p44_CI
-
A Conceptual Model for Integrative Information Systems Security, by Alexander D. Korzyk, John W. Sutherland and Heinz Roland Weistroffer - Cart Item
-
JISSec_V2N1_Muntermann_p27_CI
-
Security Issues And Capabilities of Mobile Brokerage Services and Infrastructures, by Jan Muntermann and Heiko RoBnagel - Cart Item
-
JISSec_V2N1_Carlsson_p3_CI
-
Security Consistency in Information Ecosystems: Structuring the Risk Environment on the Internet, by Bengt Carlsson and Andreas Jacobsson - Cart Item
-
V2N1_Carlsson.html
-
Security Consistency in Information Ecosystems: Structuring the Risk Environment on the Internet, by Bengt Carlsson and Andreas Jacobsson
|
|