Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             14 results found
no title author magazine year volume issue page(s) type
1 A Hot Query Bank approach to improve detection performance against SQL injection attacks Chung, Yu-Chi
2012
31 2 p. 233-248
16 p.
article
2 Coding for Penetration Testers Leithner, Manuel
2012
31 2 p. 252-
1 p.
article
3 Contents 2012
31 2 p. iii-
1 p.
article
4 Cyber Attacks Bayuk, Jennifer L.
2012
31 2 p. 251-
1 p.
article
5 Editorial Spafford, Eugene H.
2012
31 2 p. 149-150
2 p.
article
6 Formal security policy implementations in network firewalls Macfarlane, Richard
2012
31 2 p. 253-270
18 p.
article
7 HIPAA Privacy Rule compliance: An interpretive study using Norman’s action theory Liginlal, Divakaran
2012
31 2 p. 206-220
15 p.
article
8 IFC - Editorial Board 2012
31 2 p. IFC-
1 p.
article
9 Multiple-File Remote Data Checking for cloud storage Xiao, Da
2012
31 2 p. 192-205
14 p.
article
10 Performance of automated network vulnerability scanning at remediating security issues Holm, Hannes
2012
31 2 p. 164-175
12 p.
article
11 Security evaluation of biometric keys Al-Assam, Hisham
2012
31 2 p. 151-163
13 p.
article
12 Security Risk Management: Building an Information Security Risk Management Program from the Ground Up Michael, Katina
2012
31 2 p. 249-250
2 p.
article
13 Toward a general defense against kernel queue hooking attacks Wei, Jinpeng
2012
31 2 p. 176-191
16 p.
article
14 Unrealistic optimism on information security management Rhee, Hyeun-Suk
2012
31 2 p. 221-232
12 p.
article
                             14 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands