The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gerald L. Kovacich: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gerald L. Kovacich
    Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:4, pp:326-336 [Journal]
  2. Gerald L. Kovacich
    Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:421-427 [Journal]
  3. Gerald L. Kovacich
    Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:505-519 [Journal]
  4. Gerald L. Kovacich
    Protecting 21st Century Information It's Time for a Change. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:3, pp:207-213 [Journal]
  5. Gerald L. Kovacich
    The Corporate Information Assurance Officer (CIAO). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:4, pp:302-307 [Journal]
  6. Gerald L. Kovacich
    Recovering computer-generated evidence. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:4, pp:289-296 [Journal]
  7. Gerald L. Kovacich
    Establishing a network security programme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:6, pp:486-498 [Journal]
  8. Gerald L. Kovacich
    Information warfare and the information systems security professional. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:1, pp:14-24 [Journal]
  9. Gerald L. Kovacich
    The ISSO must understand the business and management environment. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:4, pp:321-326 [Journal]
  10. Gerald L. Kovacich
    ISSO career development. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:6, pp:455-458 [Journal]
  11. Gerald L. Kovacich
    Information systems security metrics management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:610-618 [Journal]
  12. Gerald L. Kovacich
    How to market yourself as an ISSO. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:8, pp:657-662 [Journal]
  13. Gerald L. Kovacich
    Electronic-internet business and security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:129-135 [Journal]
  14. Gerald L. Kovacich
    Establishing an Information Systems Security Organization (ISSO). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:7, pp:600-612 [Journal]
  15. Gerald L. Kovacich
    I-way robbery: Crime on the internet. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:3, pp:211-220 [Journal]
  16. Gerald L. Kovacich
    Hackers: Freedom fighters of the 21st Century. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:573-576 [Journal]
  17. Gerald L. Kovacich, William C. Boni
    Internet Targets. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:133-140 [Journal]
  18. Gerald L. Kovacich, Andy Jones
    What InfoSec professionals should know about information warfare tactics by terrorists. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:1, pp:35-41 [Journal]
  19. Gerald L. Kovacich, Andy Jones
    What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:2, pp:113-119 [Journal]

Search in 0.056secs, Finished in 0.057secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002