Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Incidents (Page 7 of 9)   < Prev  2 3 4 5 6 7 8 9  Next >
Over Your Shoulder: The Debate Over Internet and E-mail Surveillance in the Workplace
By: Ben Malisow 2001-05-23
http://www.securityfocus.com/infocus/1264

Vulnerability Assessment Survey
By: Richard Wiens 2000-09-29
http://www.securityfocus.com/infocus/1263

Keys to Successful Incident Response Teams
In this article, the author talks about an increasing general awareness amongst organizations to become more tuned into security needs and developments. Building and deploying Incident Response Teams (IRTs) is the next logical step for organizations that have not yet done so, and so the writer walks you through the history, and the steps taken to form successful Incident Response Teams (IRTs), developing quality Incident Prevention and Educational policies, and forensic detail of computer cri...
By: Sarah Granger 2001-08-21
http://www.securityfocus.com/infocus/1262

Over Your Shoulder: Why Your Employer is Entitled to Watch You

By: Ben Malisow 2001-05-23
http://www.securityfocus.com/infocus/1261

Never Worry About Security
By: John D. Johnson 2000-08-18
http://www.securityfocus.com/infocus/1259

Moment's Notice: The Immediate Steps of Incident Handling
By: Ben Malisow 2000-07-07
http://www.securityfocus.com/infocus/1258

Personal Interface: The Relationship Between Users and Security Personnel in the Modern Environment
By: Ben Malisow 2000-04-27
http://www.securityfocus.com/infocus/1257

Have Root, Will Hack: 80 Agonizing Hours in the Life of an Information Systems Security Officer
By: Robert G. Ferrell 2000-06-13
http://www.securityfocus.com/infocus/1256

Know Your Enemy: A Forensic Analysis
By: Lance Spitzner 2000-05-23
http://www.securityfocus.com/infocus/1255

Fortifying My Doghouse while Thieves Steal My Computer
By: John D. Johnson 2000-06-30
http://www.securityfocus.com/infocus/1254

Incidents (Page 7 of 9)   < Prev  2 3 4 5 6 7 8 9  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus