Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Susan D. Hansche |
Awareness and Training: Appendices. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Todd Fitzgerald |
Management Commitment: Security Councils. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeffrey Davis |
Defense in Depth: Network, Systems, and Applications Controls. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Craig A. Schiller |
Espionage: Counter-Economic. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Will Ozier |
Risk Analysis and Assessment: Risk Assessment Tasks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Steven F. Blanding |
Network Router Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Policy Development: Needs. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | George Wade |
Computer Crime: Investigations. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Hugh Murray |
XML and Other Metadata Languages. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kenneth J. Knapp, R. Franklin Morris Jr. |
Architecture: Biological Cells. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Matthew J. Decker |
Physical Layer Security: Networks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kenneth F. Belva |
Pod-Slurping: Other Vulnerabilities. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lowell Bruce McCulley |
Application Systems Development. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Samantha Thomas |
Risk Assessment. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Keith Pasley |
Application Layer Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | James S. Tiller |
Managed Security Service Providers (MSSPs). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ben Rothke |
Java. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carol A. Siegel, Ty R. Sagalow, Paul Serritella |
Cyber-Risk Management: Enterprise-Level Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Al Berg |
Applets: Network Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Dennis Seymour Lee |
Wireless Internet Security: Portable Internet Devices. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Rebecca Herold |
Fraud: Employee Identification. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William T. Harding, Anita J. Reed, Robert L. Gray |
Cookies and Web Bugs. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl B. Jackson |
Business Impact Analysis: Process. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mollie E. Krehnke, David C. Krehnke |
Data Access Controls: Sensitive or Critical. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mark Edmead |
Steganography. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Stephen James |
Auditing: Self-Hacking. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | John O. Wylder |
Personal Accountability: Corporate Information Security Policy. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sean M. Price |
Insider Threats: System and Application Weaknesses. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl B. Jackson, Mark Carey |
Risk Management: Enterprise. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Henry 0001 |
Physical Security: Melding with Information Systems Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Robby Fussell |
Quantum Computing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Samuel W. Chun |
Awareness and Training: Motivational and Psychological Factors. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul A. Henry |
Tokens: Authentication. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | |
Glossary. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mollie E. Krehnke, David C. Krehnke |
Certification and Accreditation: Methodology. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Praveen Gauravaram, Lars R. Knudsen |
Cryptographic Hash Functions. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sean M. Price |
Information Flow: Selecting Countermeasures. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Georges J. Jahchan |
Network Content Filtering and Leak Prevention. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | David C. Krehnke |
Corporate Governance. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Christopher Steinke |
Physical Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Samuel C. McClintock |
Xml. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ralph Hoefelmeyer, Theresa E. Phillips |
Malicious Code. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mandy Andress |
Web Applications: Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Todd Fitzgerald |
Phishing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bonnie A. Goins Pilewski, Christopher A. Pilewski |
Network Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Todd Fitzgerald |
Security Policy Development and Distribution: Web-Based. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Al Bredenberg |
E-Mail: Spam. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken M. Shaurette |
Information Security Basics: Effective Practices. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Virtual Network Computing (VNC) Systems. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Matthew J. Decker |
Enterprise Security Capability: Common Models. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sean M. Price |
Information Flow: Emerging and Potential Techniques and Covert Channels. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Franjo Majstor |
Storage Area Networks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Rebecca Herold |
Incident Response: Privacy Breaches. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ralph Spencer Poore |
Global Transmissions: Jurisdictional Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Gilbert Held |
IPv6: Expanding Internet Support. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeffery J. Lowder |
UNIX Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ron Moritz |
Internet Mobile Code. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Don Evans |
Systems Integrity Engineering: Methodology and Motivational Business Values and Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Rebecca Herold |
Privacy Governance: Effective Methods. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William A. Yarberry Jr. |
Telephony Systems: Auditing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | David MacLeod, Brian T. Geffert, David Deckter |
Health Insurance Portability and Accountability Act (HIPAA): Security Readiness. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Larry R. Leibrock |
Digital Forensics and E-Discovery. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Gerald Bowman |
Physical Security: Mission-Critical Facilities and Data Centers. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Brian Shorten |
Information Security Policies. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Steven F. Blanding |
Asynchronous Transfer Mode (ATM): Integrity and Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carol Stucki |
Forensics: Non-Liturgical Examinations. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Steve Stanek |
Cryptography: Auditing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | R. Scott McCoy |
Perimeter Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Henry 0001 |
Security Development Lifecycle. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl Burney |
Information Systems Security Officer: Roles and Responsibilities. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ben Rothke |
Common Criteria. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Charles R. Hudson Jr. |
Awareness and Training: Framework. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | E. Eugene Schultz, Eugene H. Spafford |
Intrusion Detection Systems (IDSs): Implementation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Michael J. Corby |
Forensics: Operational. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Debra S. Herrmann |
Common Criteria: IT Security Evaluation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Rebecca Herold |
Privacy Breaches: Policies, Procedures, and Notification. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Keith Pasley |
Virtual Private Networks (VPNs): Perspectives. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
Spyware: Ethical and Legal Concerns. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul A. Henry |
Firewall Architectures: Platforms. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | George Richards |
Workplace Violence. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Don Evans |
Systems Integrity Engineering: Interoperable Risk Accountability Concepts. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken M. Shaurette |
Risk Management Model: Technology Convergence. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Henry 0001 |
Business Continuity Planning: Case Study. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lynda L. McGhie, Phillip Q. Maier |
World Wide Web. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken M. Shaurette |
Sarbanes-Oxley Act of 2002 (SOX). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | George G. McBride |
Integrated Threat Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Craig A. Schiller |
Mergers and Acquisitions. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Henry 0001 |
Operations Security: Support and Control. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Secure Socket Layer (SSL). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ronald A. Gove |
Cryptography: Encryption and. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Henry 0001 |
Risk Management and Analysis. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Derek Schatz |
Security Management Program: Prioritization. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Stackpole, Man Nguyen |
Systems Management: Third-Party Applications and Systems. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Peter S. Tippett |
Ethics. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mollie E. Krehnke |
Crime Prevention: Environmental Design. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bruce R. Matthews |
Physical Security: Controlled Access and Layered Defense. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ed Gabrys |
Cybercrime: Council of Europe. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | James S. Tiller |
Virtual Private Networks (VPNs): Leverage. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | James S. Tiller |
Identity Theft. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Anton Chuvakin |
Honeypots and Honeynets. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|