Author | Title |
Naif Alqramin | Analyzing Cyber Threats at a Public WIFI Hotspot |
Gary Bannister | The Security Case for "De-Perimeterization and Hardening the Host" - the Jerhico Model |
Ivan Barrera | Converting your old PC into a Unified Threat Management Appliance, an Inexpensive and Ultimate Defense for Small Office and Home Office Networks |
Ramiro Buenrostro | Convergence: The Integration of Physical and IT Security |
Christopher Beggs | Mobile Personal Digital Assistants |
Bob Benson | Virtual Info Sec Computer Lab |
Cedrick Burrows | Efficient Authentication Systems for a Small- to Medium-Sized Bank |
Chris Coglianese | Taking Security to Eleven in Your Microsoft Environment |
Rob Denney | Configuring a Cisco ASA 5505 |
Jason Ekstrom | Metalsoft Vulnerability Assessment |
Adebiaye Fapetu | RSS Security in Ethernet Network Protocol |
Karen Graczyk | Creating a Security Awareness Program for the National Insurance Crime Bureau |
Howard Harvey | HIPAA Compliance Analysis for Foundation Services |
Kyle Hess | Modern Information Security Policies and Procedures |
Felinda Holmes | Employee Acceptable Use Policy |
Jay Johnson | Creating a Secure IT Network for a Small, Non-Profit Organization |
Jeff Jones | Mac OS X Security Assessment Project |
George Jordan | Securing an Enterprise Computer Network with the Security Development Life Cycle |
Kevin Keay | Building and Securing a Corporate DMZ in Preparation for a Data Center Migration |
Kividi Kikama | Securing the Rapid Application Development (RAD) Methodology |
Nancy Kolb | Implementing a Security Awareness Program for a Non-Profit Organization |
Matt Kwiatkowski | The Scavenger Project |
Mark Las | Augmenting Perimeter Security Networks with Cisco Self-Defending Networks |
Yvonne LeClaire | The Forensic Process Examined: Creating Cases for Classroom Use |
Amy Maskiewicz | Data Sanitization: A forensic look at used hard drives |
Trina McNamara | Online, On-Premise, or Privately Built: The Right CRM for One Nonprofit |
Michael Morfoot | Disaster Recovery in the Business Enterprise |
Ahmed Mustafa | A Survey of Mobile Platform Security |
Tung Nguyen | False Assurance in Smartphone Security for Users |
Oyesola Oke | Evaluating the Security of E-Government in West Africa |
Monica Oteng-Boateng | Data Backup Security: Best Practices for K-12 International Schools in South Korea |
Brian Pohlman | The Dark Side of the Internet: Introduction to Malware |
Vijai Rajagopalan | Project Information Security (PROISEC) Portal |
Colin Reid | Mitigating Identity Theft |
Dwayne Shaffer | Proactive and Reactive Measures Used to Secure Your Smartphone and Its Data and Smartphone Basics |
Jayme Speva | Computer Architecture Using a Thorough, Concise, Step-by-Step Approach: A Course for Newcomers to the Information Security Field |
Albert Stanley | Global Markets: OPTI Management Resources (OMR) Segregation of Duties |
Veo Taylor | Case Study: Small Organization Business Continuity Plan Creation |
Jeff Turley | VMware Security Best Practices |
Chris Urban | Implementation of a Comprehensive EMR System in the Secure Corporate Environment |
Michelle Walden | Web 2.0 in the Workplace |
Brian Yoshino | Securing an Active Directory Network Infrastructure |