Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Jeffrey Davis |
Tokens: Role and Authentication. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Louis B. Fried |
Object-Oriented Programming. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Franjo Majstor |
Wireless Local Area Networks (WLANs): Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | James S. Tiller |
Virtual Private Networks (VPNs). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | John R. Vacca |
Virtual Private Networks (VPNs): Remote Access. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Joe Kovara, Ray Kaplan |
Kerberos™. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | David McPhee |
Information Technology Infrastructure Library (ITIL®). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Brett Regan Young |
Risk Management: Trends. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Joe Kovara, Ray Kaplan |
Kerberos™: Ongoing Development. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Simple Network Management Protocol (SNMP). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl B. Jackson |
Business Continuity Planning: Enterprise Risk Management Structure. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ben Rothke |
Pod Slurping: Concepts. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Michael J. Corby |
Privacy: Policy Formation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bryan D. Fish |
Artificial Intelligence (AI): Intrusion Analysis. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Joe Kovara, Ray Kaplan |
Kerberos™: Services and Functions. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Will Ozier |
Risk Analysis and Assessment: Terms and Definitions. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Felicia M. Nicastro |
Technology Convergence: People, Process and Technology. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Hugh Murray |
Instant Messaging. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Gilbert Held |
Spoofing and Denial of Service Attacks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | George G. McBride |
Mobile Data Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Steve A. Rodgers |
Packet Sniffers. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Dan M. Bowers |
Physical Access Control. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | John Dorf, Martin Johnson |
Business Continuity Planning: Restoration Component. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sasan Hamidi |
Steganography: Detection. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Robby Fussell |
Adaptable Protocol Framework. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Hugh Murray |
System Design Flaws. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Thomas R. Peltier |
Awareness and Training: Program Elements. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lynda L. McGhie |
Security Teams: Effective Methods. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Gilbert Held |
Wireless Local Area Networks (WLANs): Vulnerabilities. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Scott Erkonen |
ISO Standards and Certification. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mark Bell |
Domain Name Service (DNS) Attacks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Leighton Johnson III |
Configuration Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Douglas G. Conorich |
Internet Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Joseph T. Hootman |
Tokens: Evaluation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ralph Spencer Poore |
Cryptography: Transitions. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Donald R. Richards |
Biometrics: Identification. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Craig A. Schiller |
Malicious Code: Quasi-Intelligence. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Micah Silverman |
Proxy Servers. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ian Lim, Ioana V. Bazavan |
System Development Security: Methodology. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Christopher A. Pilewski |
Wireless Penetration Testing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mano Paul |
Format String Vulnerabilities. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Thomas Welch |
Forensics: Rules of Evidence. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Stephen D. Fried |
Offshore Development. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sandy Bacik |
Tape Backups: Validation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Stephen D. Fried |
Penetration Testing: Policies. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mignona Cote |
Committee of Sponsoring Organizations (COSO). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Micki Krause |
Ethics: Internet. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Stephen D. Fried |
E-Mail Retention Policy: Legal Requirements. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Thomas Akin |
Cybercrime: Response, Investigation, and Prosecution. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kenneth J. Knapp, Thomas E. Marshall |
Management Support of IT: Survey. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ben Rothke |
Cryptography: Quantum. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Donn B. Parker |
Computer Abuse. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Samuel W. Chun, Leo Kahng |
Data at Rest. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Phillip Q. Maier |
Portable Computing Environments. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Henry 0001 |
Business Continuity Planning: Collaborative Approach. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Transport Layer Security (TLS). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sureerut Inmor, Vatcharaporn Esichaikul, Dencho N. Batanov |
Systems Development: Object-Oriented Security Model. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken Buszta |
Security Management Team Organization. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Stephen D. Fried |
Application Service Providers: Secure Relationships. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Susan D. Hansche |
Awareness and Training. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Marcus Rogers |
Digital Crime Scene Analysis (DCSA). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Edward H. Freeman |
Privacy: Legal Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Christina M. Bird |
Remote Access: Secure. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Patrick D. Howard |
Security Policy Lifecycle: Functions and Responsibilities. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Maria Schuett |
Reduced Sign-On. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Will Ozier |
Risk Analysis and Assessment: Risk Management Tasks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Leighton Johnson III |
Security Incident Response. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Tom Carlson |
Information Security Management Systems (ISMSs). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bruce A. Lobree |
E-Mail: Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | John R. Vacca |
Data Centers: Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeffrey H. Fenton, James M. Wolfe |
Human Resources: Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Steven F. Blanding |
External Networks: Secured Connections. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Stackpole |
Centralized Authentication Services. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sanford Sherizen |
Management Compliance: Confidential Information. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Robert B. Batie Jr. |
Information Systems Security Engineering Professional (ISSEP). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul A. Henry |
Firewall Architectures. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Satnam Purewal |
PeopleSoft Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | James Trulove |
Physical Layer Security: Wired and Wireless Connections. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ben Rothke |
Advanced Encryption Standard (AES). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | George G. McBride |
Voice Communications: Voice-over-IP (VoIP) Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Keith Pasley |
Virtual Private Networks (VPNs): Deployment and Evaluation Strategy. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Michael Pike |
Operations Security: Abuses. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Foster J. Henderson, Kellina M. Craig-Henderson |
Architecture: Models. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sean M. Price |
Buffer Overflows: Attacks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William C. Boni |
High-Tech Trade Secrets. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Rebecca Herold |
Information Protection. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Keith Pasley |
Hash Algorithms. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Samuel W. Chun |
Network and Telecommunications: Media. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Edward H. Freeman |
Personnel: Practices. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Georges J. Jahchan |
Web Applications: Firewalls. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jonathan Held |
Data Sanitization: SQL Injection. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Marcus Rogers |
Incident Response: Evidence Handling. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Henry 0001 |
Personnel: Security Roles. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Franjo Majstor |
End Node Security and Network Access Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ralph Spencer Poore |
Information Security Governance: Basic Corporate Organization. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Anton Chuvakin |
Covert Channels. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Per Thorsheim |
Firewall Technologies: Comparison. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Matt Nelson |
Capability Maturity Model. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chuck Bianco |
Penetration Testing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Douglas C. Merrill, Eran Feigenbaum |
Public Key Infrastructure (PKI): E-Business. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|