Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
The ISSA Journal

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
PDF
| Bluetoad | ePub | Mobi



April 2014

Volume 12 - Issue 4.

Feature articles include:

  • Governance of Cloud Computing Initiatives: How to Establish a Cloud Oversight Board
  • Breaking through the Clouds: Managing the Cloud Service Provider
  • DigiNo-more: Improving Trust in the CA Ecosystem
  • Cloud Services Compliance Data Standard
  • The Vulnerability Management Starter Kit: Part II
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Governance of Cloud Computing Initiatives: How to Establish a Cloud Oversight Board - at no charge or Join Now and gain full access to the ISSA Journal.


March 2014

Volume 12 - Issue 3.

Feature articles include:

  • Cybersecurity Protects Your Company’s Valuable Trade Secrets
  • Guidelines for Designing a BYOD Strategy That Succeeds
  • The Ethics of Indiscriminate Surveillance
  • Bypassing EMET 4.1
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Cybersecurity Protects Your Company’s Valuable Trade Secrets - at no charge or Join Now and gain full access to the ISSA Journal.


February 2014

Volume 12 - Issue 2.

Feature articles include:

  • Vulnerability Management Is Not Simple, but It Does Not Have to Be Hard
  • Mitigating Threats from Hacks and Hijacks in Social Media
  • Roles of Reverse Engineering in Combating Advanced Attacks
  • The Vulnerability Management Starter Kit: Part I
  • ICT Attacks in Italy: OAI 2013 Report
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Vulnerability Management Is Not Simple, but It Does Not Have to Be Hard - at no charge or Join Now and gain full access to the ISSA Journal.



January 2014

Volume 12 - Issue 1.

Feature articles include:

  • Privacy Lost: A Trip to the Mall
  • Managing Security Awareness in a Multi-Generational Workforce
  • Defending the Carbon Layer: Social Engineering Lessons Learned at DEF CON 21
  • Changing with the Times: Old School, New School, DevOps, and Beyond!
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Privacy Lost: A Trip to the Mall - at no charge or Join Now and gain full access to the ISSA Journal.



December 2013

Volume 11 - Issue 12.

Feature articles include:

  • Survivability in the Information Security Context
  • Cyber Heists: What Happened, Mistakes Made, Court Reactions, and What You Should Do!
  • Ethical Hacking
  • Secrets of an Information Security Management Consultant
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Survivability in the Information Security Context - at no charge or Join Now and gain full access to the ISSA Journal.



November 2013

Volume 11 - Issue 11.

Feature articles include:

  • Data Exfiltration and Forensic Analysis in a Microsoft Windows Environment
  • A Look at Apple’s Touch ID
  • New College Graduates Are Facing Challenges
  • Ways to Survive an Audit: Tips to Making Audits Easier for You and the Auditor
  • ISSA International Conference Nashville Highlights
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Data Exfiltration and Forensic Analysis in a Microsoft Windows Environment - at no charge or Join Now and gain full access to the ISSA Journal.



October 2013

Volume 11 - Issue 10.

Feature articles include:

  • Caution: Danger Ahead (with Big Data)
  • Effect of BYOD on Today’s Enterprise Security Systems
  • ISSA International Conference Guide
  • Defending the Carbon Layer: Social Engineering Lessons Learned at DEF CON 21
  • Zero Information Loss: A Keystone Habit to Drive Business Success
  • Using Behavioral Interview Techniques to Assess Supplier Security Posture
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Caution: Danger Ahead (with Big Data) - at no charge or Join Now and gain full access to the ISSA Journal.



September 2013

Volume 11 - Issue 9.

Feature articles include:

  • ISSA International Conference Guide
  • Mobile Security: Challenges, Lessons, and Future Directions
  • The FDA and BYOD: Mobile and Fixed Medical Device Cybersecurity
  • Overcoming Barriers Between InfoSec and IT Audit Practitioners
  • A Practical Assessment of Security Design Patterns
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Mobile Security: Challenges, Lessons, and Future Directions - at no charge or Join Now and gain full access to the ISSA Journal.



August 2013

Volume 11 - Issue 8.

Feature articles include:

  • ISSA 2013 International Conference Guide
  • The Unpredictability of Combining Vague Regulations with Private Enforcement
  • A Fuzzy Future in Malware Research
  • New Health Care Regulatory Risks for Cloud Providers: How to Become a Business Associate without Even Trying – or Knowing It
  • Legal Issues of Cloud Forensics
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read one of this month's articles - A Fuzzy Future in Malware Research - at no charge or Join Now and gain full access to the ISSA Journal.



July 2013

Volume 11 - Issue 7.

Feature articles include:

  • Pushing Medical Device Security Forward
  • New Health Care Regulatory Risks for Cloud Providers: How to Become a Business Associate without Even Trying – or Knowing It
  • Cyberinsurance: Understanding the Risks
  • Make Software Better with Fuzzing
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Pushing Medical Device Security Forward - at no charge or Join Now and gain full access to the ISSA Journal.



June 2013

Volume 11 - Issue 6.

Feature articles include:

  • Measuring Cloud Security
  • 2013 International Election Candidate Profiles
  • A Fuzzy Future in Malware Research
  • Best Practices for Achieving Cloud Encryption
  • Security Control Assessments for a General Support System
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Measuring Cloud Security - at no charge or Join Now and gain full access to the ISSA Journal.


May 2013

Volume 11 - Issue 5.

Feature articles include:

  • Building a Better Information Assurance Degree and Promoting Cybersecurity Education
  • 2013 International Election Candidate Profiles
  • Governance Model and Advanced Information Sharing Framework for Global Computer Emergency Response Teams
  • Analyzing Performance of Open Source Web Application Security Scanners
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Building a Better Information Assurance Degree and Promoting Cybersecurity Education - at no charge or Join Now and gain full access to the ISSA Journal.


 

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

4/24/2014
10th Annual Charlotte-Metro ISSA Summit

5/1/2014
The First International Engineering Security Project Professional Conference

5/1/2014 » 5/2/2014
ISSA CISO Executive Forum - May 2014

5/12/2014 » 5/14/2014
Secure360 Conference

5/14/2014 » 5/15/2014
Rocky Mountain Information Security Conference

 

 


Twitter



Copyright © 2012, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information