- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
V2N1_Editorial.pdf
-
JISSec Volume 2, Number 1 Editorial
-
V2N1_FrontMatter.pdf
-
JISSec Volume 2, Number 1 Front Matter
-
JISSec_V1N3_Goel_p45_CI
-
Botnets: The Anatomy of a Case, by Sanjay Goel, Adnan Baykal and Damira Pon - Cart Item
-
JISSec_V1N3_Shanley_p18_CI
-
WIDS - A Wireless Intrusion Detection System for Detecting Man-in-the-middle Attacks, by Robert Shanley and G. Premkumar - Cart Item
-
JISSec_V1N3_Spiekermann_p2_CI
-
RFID: a Systematic Analysis of Privacy Threats & A 7-point Plan to Adress Them, by Sarah Spiekermann and Holger Ziekow - Cart Item
-
V1N3_Editorial.pdf
-
JISSec Volume 1, Number 3 Editorial
-
V1N3_FrontMatter.pdf
-
JISSec Volume 1, Number 3 Front Matter
-
V1N3.html
-
JISSec Volume 1, Number 3 (2005) contents
-
V1N3_Goel.html
-
Botnets: The Anatomy of a Case, by Sanjay Goel, Adnan Baykal and Damira Pon
-
V1N3_Shanley.html
-
WIDS - A Wireless Intrusion Detection System for Detecting Man-in-the-middle Attacks, by Robert Shanley and G. Premkumar
-
V1N2.html
-
JISSec Volume 1, Number 2 (2005) contents
-
V1N3_Spiekermann.html
-
RFID: a Systematic Analysis of Privacy Threats & A 7-point Plan to Adress Them, by Sarah Spiekermann and Holger Ziekow
-
JISSec_V1N2_Perez_p53_CI
-
Case Study: The Case of a Computer Hack, by Sharon Perez - Cart Item
-
JISSec_V1N2_Avourdiadis_p26_CI
-
SoapSY - Unifying Security Data from Various Heterogeneous Distributed Systems into a Single Database Architecture, by Nikolaos Avourdiadis, Andrew JC Blyth ...
-
V1N2_Perez.html
-
Case Study: The Case of a Computer Hack, by Sharon Perez
-
V1N2_Avourdiadis.html
-
SoapSY - Unifying Security Data from Various Heterogeneous Distributed Systems into a Single Database Architecture, by Nikolaos Avourdiadis, Andrew JC Blyth ...
-
JISSec_V1N2_Ramachandran_p3_CI
-
Methodology to Assess the Impact of Investments in Security Tools and Products, by Sriraman Ramachandran and Greg B. White - Cart Item
-
V1N2_Ramachandran.html
-
Methodology to Assess the Impact of Investments in Security Tools and Products, by Sriraman Ramachandran and Greg B. White
-
V1N2_Editorial.pdf
-
JISSec Volume 1, Number 2 Editorial
-
V1N2_FrontMatter.pdf
-
JISSec Volume 1, Number 2 Front Matter
-
V1N1_Angell.html
-
Systemic Risk redefining Digital Security, by Ian O. Angell
-
JISSec_V1N1_Perlman_p51_CI
-
The Ephemerizer: Making Data Disappear, by Radia Perlman - Cart Item
-
V1N1_Baskerville.html
-
Information Warfare: A Comparative Framework for Business Information Security, by Richard Baskerville
-
V1N1_Perlman.html
-
The Ephemerizer: Making Data Disappear, by Radia Perlman
-
JISSec_V1N1_Baskerville_p23_CI
-
Information Warfare: A Comparative Framework for Business Information Security, by Richard Baskerville - Cart Item
-
JISSec_V1N1_Angell_p7_CI
-
Systemic Risk redefining Digital Security, by Ian O. Angell - Cart Item
-
Volume 4, Number 2
-
This is JISSec Volume 4, Number 2 launch announcement
-
ticker.xml
-
-
ticker.swf
-
-
JISSec_Individual_Subscription_(Online_and_Print)
-
JISSec Individual Subscription (Online and Print) - Cart Item