You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 745 items matching your search terms

Subscribe to an always-updated feed of these search terms

File V2N1_Editorial.pdf
JISSec Volume 2, Number 1 Editorial
File V2N1_FrontMatter.pdf
JISSec Volume 2, Number 1 Front Matter
Cart Item JISSec_V1N3_Goel_p45_CI
Botnets: The Anatomy of a Case, by Sanjay Goel, Adnan Baykal and Damira Pon - Cart Item
Cart Item JISSec_V1N3_Shanley_p18_CI
WIDS - A Wireless Intrusion Detection System for Detecting Man-in-the-middle Attacks, by Robert Shanley and G. Premkumar - Cart Item
Cart Item JISSec_V1N3_Spiekermann_p2_CI
RFID: a Systematic Analysis of Privacy Threats & A 7-point Plan to Adress Them, by Sarah Spiekermann and Holger Ziekow - Cart Item
File V1N3_Editorial.pdf
JISSec Volume 1, Number 3 Editorial
File V1N3_FrontMatter.pdf
JISSec Volume 1, Number 3 Front Matter
Document V1N3.html
JISSec Volume 1, Number 3 (2005) contents
Record V1N3_Goel.html
Botnets: The Anatomy of a Case, by Sanjay Goel, Adnan Baykal and Damira Pon
Record V1N3_Shanley.html
WIDS - A Wireless Intrusion Detection System for Detecting Man-in-the-middle Attacks, by Robert Shanley and G. Premkumar
Document V1N2.html
JISSec Volume 1, Number 2 (2005) contents
Record V1N3_Spiekermann.html
RFID: a Systematic Analysis of Privacy Threats & A 7-point Plan to Adress Them, by Sarah Spiekermann and Holger Ziekow
Cart Item JISSec_V1N2_Perez_p53_CI
Case Study: The Case of a Computer Hack, by Sharon Perez - Cart Item
Cart Item JISSec_V1N2_Avourdiadis_p26_CI
SoapSY - Unifying Security Data from Various Heterogeneous Distributed Systems into a Single Database Architecture, by Nikolaos Avourdiadis, Andrew JC Blyth ...
Record V1N2_Perez.html
Case Study: The Case of a Computer Hack, by Sharon Perez
Record V1N2_Avourdiadis.html
SoapSY - Unifying Security Data from Various Heterogeneous Distributed Systems into a Single Database Architecture, by Nikolaos Avourdiadis, Andrew JC Blyth ...
Cart Item JISSec_V1N2_Ramachandran_p3_CI
Methodology to Assess the Impact of Investments in Security Tools and Products, by Sriraman Ramachandran and Greg B. White - Cart Item
Record V1N2_Ramachandran.html
Methodology to Assess the Impact of Investments in Security Tools and Products, by Sriraman Ramachandran and Greg B. White
File V1N2_Editorial.pdf
JISSec Volume 1, Number 2 Editorial
File V1N2_FrontMatter.pdf
JISSec Volume 1, Number 2 Front Matter
Record V1N1_Angell.html
Systemic Risk redefining Digital Security, by Ian O. Angell
Cart Item JISSec_V1N1_Perlman_p51_CI
The Ephemerizer: Making Data Disappear, by Radia Perlman - Cart Item
Record V1N1_Baskerville.html
Information Warfare: A Comparative Framework for Business Information Security, by Richard Baskerville
Record V1N1_Perlman.html
The Ephemerizer: Making Data Disappear, by Radia Perlman
Cart Item JISSec_V1N1_Baskerville_p23_CI
Information Warfare: A Comparative Framework for Business Information Security, by Richard Baskerville - Cart Item
Cart Item JISSec_V1N1_Angell_p7_CI
Systemic Risk redefining Digital Security, by Ian O. Angell - Cart Item
News Item Volume 4, Number 2
This is JISSec Volume 4, Number 2 launch announcement
File ticker.xml
File ticker.swf
Cart Item JISSec_Individual_Subscription_(Online_and_Print)
JISSec Individual Subscription (Online and Print) - Cart Item