-
1
-
-
71549157959
-
Determinants of Information Technology Outsourcing: A cross-sectional Analysis
-
L. Loh and N. Venkatraman, "Determinants of Information Technology Outsourcing: A cross-sectional Analysis", Journal of Management Information Systems 9(1), 1992
-
(1992)
Journal of Management Information Systems
, vol.9
, Issue.1
-
-
Loh, L.1
Venkatraman, N.2
-
2
-
-
62349104124
-
Why do some firms outsource IT more aggressively than others? The effects of organizational characteristics on IT Outsourcing decisions
-
Wonsock Oh, "Why do some firms outsource IT more aggressively than others? The effects of organizational characteristics on IT Outsourcing decisions", Proceedings of the 38th Hawaii Conference on system sciences, 2005
-
(2005)
Proceedings of the 38th Hawaii Conference on system sciences
-
-
Wonsock, O.1
-
6
-
-
0034966257
-
-
B. A. Aubert, M. Patry, S. Rivard and H. Smith, H, IT Outsourcing Risk Management at British Petroleum, Proceedings of the 34th Hawaii International Conference on System Sciences HICSS, Jan 5-8, 2001
-
B. A. Aubert, M. Patry, S. Rivard and H. Smith, H, "IT Outsourcing Risk Management at British Petroleum", Proceedings of the 34th Hawaii International Conference on System Sciences HICSS, Jan 5-8, 2001
-
-
-
-
7
-
-
0003113895
-
The Risks of Outsourcing IT
-
Spring
-
M. J Earl, "The Risks of Outsourcing IT", Sloan Management Review, 37, 3, Spring 1996
-
(1996)
Sloan Management Review
, vol.37
, pp. 3
-
-
Earl, M.J.1
-
8
-
-
0012597186
-
Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA
-
L. Willcocks, M. Lacity, T. Kern, "Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA", Journal of Strategic Information Systems, 8, 1999
-
(1999)
Journal of Strategic Information Systems
, vol.8
-
-
Willcocks, L.1
Lacity, M.2
Kern, T.3
-
9
-
-
0042484572
-
CSI/FBI computer crime and security survey
-
R. Power, 2002 CSI/FBI computer crime and security survey. Computer Security Issues & Trends 8, 1 (2002)
-
(2002)
Computer Security Issues & Trends
, vol.8
, pp. 1
-
-
Power, R.1
-
10
-
-
0028430224
-
Network Intrusion detection
-
B. Mukherjee, L.T. Heberlein, and K.N. Levitt, "Network Intrusion detection", IEEE Network, Vol.8, No. 3, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
13
-
-
62349138792
-
The Honeynet Project: Trapping the Hackers
-
March/April
-
L. Spitzner, "The Honeynet Project: Trapping the Hackers," IEEE Security & Privacy, March/April 2004
-
(2004)
IEEE Security & Privacy
-
-
Spitzner, L.1
-
15
-
-
62349102743
-
Cybersecurity Considerations for Information Systems
-
2nd. Edition, ed. D. Garson, CRC Press
-
C. E. Irvine, "Cybersecurity Considerations for Information Systems", Handbook of Public Information Systems, 2nd. Edition, ed. D. Garson, CRC Press, 2004
-
(2004)
Handbook of Public Information Systems
-
-
Irvine, C.E.1
-
16
-
-
84942442825
-
Capture-the-Flag: Learning Computer Security Under Fire
-
Monterey, CA, July
-
C. Eagle, J. L. Clark, "Capture-the-Flag: Learning Computer Security Under Fire", Proceedings from the Sixth Workshop on Education in Computer Security, Monterey, CA, 12-14, July 2004
-
(2004)
Proceedings from the Sixth Workshop on Education in Computer Security
, pp. 12-14
-
-
Eagle, C.1
Clark, J.L.2
-
17
-
-
17444417128
-
Averting Security Missteps in Outsourcing
-
Michael Lesk, "Averting Security Missteps in Outsourcing", IEEE Security and Privacy, 2005
-
(2005)
IEEE Security and Privacy
-
-
Lesk, M.1
-
19
-
-
62349085853
-
Co-operators Life CEO Apologizes for Theft of Sensitive Customer Data,
-
30 Jan
-
CBC Online News, "Co-operators Life CEO Apologizes for Theft of Sensitive Customer Data," 30 Jan. 2003; www.cbc.ca/stories/2003/01/30/ cooperators030130
-
(2003)
CBC Online News
-
-
-
20
-
-
17444411077
-
Computer File with Vital ID Data Goes Missing
-
CTV.ca, 31 Jan
-
A. Mullholland, "Computer File with Vital ID Data Goes Missing," CTV.ca, 31 Jan. 2003; www.ctv.ca/servlet/ArticleNews/story/ CTVNews/1043943775310-127
-
(2003)
-
-
Mullholland, A.1
-
21
-
-
62349118729
-
-
Anderson. Computer security threat monitoring and surveillance Technical report, James P. Anderson Co., Fort Washington, PA, April 1980
-
Anderson. "Computer security threat monitoring and surveillance" Technical report, James P. Anderson Co., Fort Washington, PA, April 1980
-
-
-
-
22
-
-
0003894350
-
Tcpdump
-
Available via anonymous FTP from
-
V. Jacobson, C. Leres and S. McCanne, "Tcpdump", Available via anonymous FTP from ftp.ee.lbl.gov. 1989
-
(1989)
-
-
Jacobson, V.1
Leres, C.2
McCanne, S.3
-
23
-
-
0034270431
-
Defending Yourself: The Role of Intrusion Detection Systems
-
John McHugh, Alan Christie, and Julia Allen, "Defending Yourself: The Role of Intrusion Detection Systems", IEEE Software, 2000
-
(2000)
IEEE Software
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
24
-
-
62349118429
-
-
R. A. Kemmerer and G. Vigna,Intrusion detection: a brief history and overview, IEEE Security & Privacy, URL http://computer.org/ computer/sp/articles/kem/, 2002
-
R. A. Kemmerer and G. Vigna,"Intrusion detection: a brief history and overview", IEEE Security & Privacy, URL http://computer.org/ computer/sp/articles/kem/, 2002
-
-
-
|