Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | William Hugh Murray |
Ownership and Custody of Data. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ian Clark |
Role-Based Access Control. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Polly Perryman Kuver |
Object-Based Applications: Testing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mansour Sheikhan |
Chaotic-Based Communication Systems. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Harold F. Tipton |
Information Security Controls: Types. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Franjo Majstor, Guy Vancollie |
Encryption Key Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | K. Narayanaswamy |
Denial-of-Service Attacks. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Roxanne E. Burkey |
Software Piracy. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeff Misrahi |
Business Partnerships: Validation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Stackpole |
Application Layer Security: Network Protocols. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl B. Jackson |
Business Continuity Planning: Evolution in Response to Major News Events. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Electronic Commerce: Auditing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Micki Krause |
Healthcare Industry. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Edward H. Freeman |
Bally v. Faber. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ben Rothke |
Fax Machines. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mano Paul |
Bluesnarfing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl B. Jackson |
Business Continuity Management: Testing, Maintenance, Training, and Awareness. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sasan Hamidi |
Distributed Computing: Grid Environment. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Nick Halvorson |
Information Security Management Systems (ISMSs): Risk Diagnosis and Treatment. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken Buszta |
Directory Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Geoffrey C. Grabow |
Public Key Hierarchy. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Michael Pike |
Malicious Code: Organized Crime. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Anderson Ramos |
Inspection Technologies: Deep Packets. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Timothy R. Stacey |
Awareness and Training: Briefing for the End User. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Edward H. Freeman |
State of Washington v. Heckel. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken M. Shaurette |
Intrusion Detection Systems (IDSs). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl B. Jackson |
Business Continuity Planning: Process Reengineering. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Marcus Rogers |
Social Engineering: Mitigation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Glenn Cater |
Service Oriented Architecture (SOA). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Todd Fitzgerald |
Information Security Governance: Corporate Organization, Frameworks, and Reporting. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Marcus Rogers, Sean C. Leshney |
Virtualization and Digital Investigations. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Patricia A. P. Fisher |
Operations Security: Controls. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | David A. Litzau |
Surveillance: Closed-Circuit Television and Video. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bryan T. Koch |
Enclaves: Enterprise as Extranet. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul A. Henry |
Firewall Architectures: Other Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Stackpole |
IP Security Protocol Working Group (IPSec). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Felicia M. Nicastro |
Patch Management: Process. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William A. Yarberry Jr. |
PBX Firewalls. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Don Evans |
Systems Integrity Engineering: Distributed Processing Concepts and Corresponding Security-Relevant Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Christopher A. Pilewski |
Computer Crime. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Steven F. Blanding |
Network Layer Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | George G. McBride |
Software Development Lifecycles: Security Assessments. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Stallings |
E-Mail: Pretty Good Privacy. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ralph Spencer Poore |
Covert Channels: Analysis and Recommendations. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kevin Castellow |
Identity Management Systems: Components. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bonnie A. Goins Pilewski |
Standards. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Tyson Heyn |
Redundant Arrays of Independent Disks (RAID). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ed Skoudis |
Hackers: Attacks and Defenses. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Customer Relationship Management (CRM). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken Doughty |
Business Continuity Management: Maintenance Processes. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken M. Shaurette, Thomas J. Schleppenbach |
Spyware. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mollie E. Krehnke |
IT Governance Institute (ITGI). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Thomas J. Bray |
Downsizing: Maintaining Information Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Christopher A. Pilewski, Bonnie A. Goins Pilewski |
Architecture: Secure. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sasan Hamidi |
Security Information Management: Myths and Facts. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Judith M. Myerson |
Biometrics: New Methods. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Alex Golod |
Access Controls: PKI-Based. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Hugh Murray |
Communication Protocols and Services. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Matunda Nyanchama, Anna Wilson |
Enterprise Security Information. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Harold F. Tipton |
Information Security Management: Purpose. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Samantha Thomas |
Planning for the Future: Challenges. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lee Imrey |
Internet Service Providers (ISPs): Accountability. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Gerald L. Kovacich |
Information Warfare. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | James S. Tiller |
Security Breaches: Reporting. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lynda L. McGhie |
Patch Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lynda L. McGhie |
Health Insurance Portability and Accountability Act (HIPAA). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Todd Fitzgerald |
Insider Threats. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ralph Spencer Poore |
Cryptography: Key Management: History and Myths. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl B. Jackson |
Business Impact Analysis: Business Process Mapping. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mollie E. Krehnke, David C. Krehnke |
Configuration Management: Process Stages. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Alan Berman, Jeffrey L. Ott |
Security Controls: Dial-Up. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Alan B. Sterneckert |
Incident Response: Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Hugh Murray |
Database Integrity. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ed Skoudis |
Sploits. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ross A. Leo |
Single Sign-On: Enterprise. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sandy Bacik |
Data Centers: Site Selection and Facility Design. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jaymes Williams |
Physical Security: Threat after September 11th, 2001. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Dean Bushmiller |
Accountability. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Thomas Welch |
Forensics: Computer Crime Investigation. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ken M. Shaurette, Thomas J. Schleppenbach |
Business Continuity Planning. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | William Tompkins |
Management Commitment. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Timothy R. Stacey |
Business Continuity Planning: Best Practices and Program Maturity. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lynda L. McGhie |
Identity Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Anthony Bruno |
Voice Communications: Voice-over-IP (VoIP) Protocols. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ben Rothke |
Radio Frequency Identification (RFID). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | E. Eugene Schultz |
Malicious Code: Rootkits. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Michael J. Corby |
Outsourcing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Network Technologies. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Louis B. Fried |
Technology Convergence: Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Chris Hare |
Voice Security. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Samuel W. Chun |
Identity-Based Self-Defending Network: 5W Network. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Gerald L. Kovacich, Andy Jones, Perry G. Luzwick |
Information Warfare: Tactics. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Carl F. Endorf |
Return on Investment (ROI). |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Paul A. Henry |
Malicious Code: Fast-Scanning Worms. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Michael Vangelos |
Incident Response: Managing. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ed Skoudis |
Hackers: Hiring Ex-Criminal. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeffery J. Lowder |
Host-Based Firewalls: Case Study. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ron Woerner |
Risk Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | R. Scott McCoy |
Physical Security: Mantraps and Turnstiles. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mano Paul |
Mashups and Composite Applications. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|