Gerald L. Kovacich

According to our database1, Gerald L. Kovacich authored at least 25 papers between 1995 and 2011.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Information Warfare: Tactics.
Proceedings of the Encyclopedia of Information Assurance, 2011

Information Warfare.
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
It's All About Power.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2006
Information Assurance - Security in the Information Environment
Computer Communications and Networks, Springer, ISBN: 978-1-84628-266-9, 2006

2002
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2.
Information Systems Security, 2002

Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1.
Information Systems Security, 2002

What InfoSec professionals should know about information warfare tactics by terrorists.
Comput. Secur., 2002

2001
Information Assurance - Surviving in the Information Environment
Computer Communications and Networks, Springer, ISBN: 978-1-85233-326-3, 2001

The Corporate Information Assurance Officer (CIAO).
Comput. Secur., 2001

Protecting 21st Century Information It's Time for a Change.
Comput. Secur., 2001

2000
Internet Targets.
Comput. Secur., 2000

Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why.
Comput. Secur., 2000

Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon.
Comput. Secur., 2000

Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care?
Comput. Secur., 2000

1999
Hackers: Freedom fighters of the 21st Century.
Comput. Secur., 1999

I-way robbery: Crime on the internet.
Comput. Secur., 1999

1998
Establishing an Information Systems Security Organization (ISSO).
Comput. Secur., 1998

Electronic-internet business and security.
Comput. Secur., 1998

1997
Information Warfare and the Information Systems Security Professional.
Information Systems Security, 1997

How to market yourself as an ISSO.
Comput. Secur., 1997

Information systems security metrics management.
Comput. Secur., 1997

ISSO career development.
Comput. Secur., 1997

The ISSO must understand the business and management environment.
Comput. Secur., 1997

1996
Establishing a network security programme.
Comput. Secur., 1996

1995
Recovering computer-generated evidence.
Comput. Secur., 1995


  Loading...