Find us on
"It's Fine," They Said. "Just Ship It," They Said.
Hardware Based Security for GE's Industrial Control Systems
The Best Way to Improve Healthcare is to Improve Computers
Managing User-Level Compromises in Enterprise Network
ISTS Information Pamphlet
Download eCampus 2010 presentations and complementing documents here.
Into the Cloud: A Hands-on Workshop Exploring the Pros and Cons of Hosting Servers in Public, Private, and Hybrid Clouds
Data Driven Security: A Different Approach to Determining Security Requirements
Picking Policy Priorities: Porn, Privacy, Procurement, P2P, or IP
So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
Characterizing the Cyberthreat Landscape
Panel Discussion: Cloud Computing - Pros and Cons
David Bucciero, John Calkins, Greg Jackson, and Sheri Stahler
Three Approaches to Awareness: Unified Messaging, Local Responses, and National Cybersecurity Awareness Month
How Should Colleges Respond to RIAA and Other File Sharing Subpoenas?
American Privacy: Can a 19th Century Right Survive 21st Century Technology
Botnets: A Look Into Today's Malware Battle Front
eDiscovery: A Panel Discussion
Adam Goldstein, George Moore, and Frederick Lane
Hacking Tools and the Hacker Curriculum
Far McKon and Sergey Bratus
Social Media and College Students: Understanding the Millennial Generation's Staying Connected Mindset
Last Updated: 12/18/14