Sciweavers

57
Voted
ISJGP
2007
53views more  ISJGP 2007»
14 years 9 months ago
Regulatory Compliance and the Chief Compliance Officer
Edward H. Freeman
54
Voted
ISJGP
2007
52views more  ISJGP 2007»
14 years 9 months ago
Wireless Handheld Devices Become Trusted Network Devices
Kevin Curran, Paul Canning
53
Voted
ISJGP
2007
59views more  ISJGP 2007»
14 years 9 months ago
Awareness Education as the Key to Ransomware Prevention
Xin Luo, Qinyu Liao
ISJGP
2007
146views more  ISJGP 2007»
14 years 9 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
84
Voted
ISJGP
2007
89views more  ISJGP 2007»
14 years 9 months ago
Trends in Security Product Evaluations
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Richard E. Smith
57
Voted
ISJGP
2007
54views more  ISJGP 2007»
14 years 9 months ago
RFIDs and Personal Privacy
Edward H. Freeman