files on web site · 2012-11-19 · gay pride parades, why a straight married guy marches in &

18
CYCLICAL KEYWORD INDEX TO PAPERS ON THE MEKABAY.COM WEB SITE Last updated 2008-11-30 15:31:00 1995, Information Warfare http://www.mekabay.com/overviews/infowar_1995.htm & http://www.mekabay.com/overviews/infowar_1995.pdf 2003, Tracking Changes in MS-Word http://www.mekabay.com/methodology/track_changes.ppt About INFOSEC: A Security Veteran in a Bad Mood Dumps on Everyone, A Rant http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf Abuse: The Blame Game, Prisoner http://www.mekabay.com/opinion/prisoner_abuse.htm & http://www.mekabay.com/opinion/prisoner_abuse.pdf Academic INFOSEC, Time for Industry to Support http://www.mekabay.com/opinion/endowed_chairs.htm & http://www.mekabay.com/opinion/endowed_chairs.pdf Action, PSYOP in http://www.mekabay.com/opinion/psyop.htm & http://www.mekabay.com/opinion/psyop.pdf Age of Information Warfare, Facilities Management in the http://www.mekabay.com/opsmgmt/facmgmt.htm & http://www.mekabay.com/opsmgmt/facmgmt.pdf Age of the Internet, Securing Your Business in the http://www.mekabay.com/infosecmgmt/securebusiness.htm & http://www.mekabay.com/infosecmgmt/securebusiness.pdf Airport Safety http://www.mekabay.com/opinion/airport_safety.htm & http://www.mekabay.com/opinion/airport_safety.pdf An Epistemological Conflict, Science and Non-Science: http://www.mekabay.com/opinion/science.htm & http://www.mekabay.com/opinion/science.pdf Analysis &, CATA: Computer-Aided Thematic http://www.mekabay.com/methodology/cata_ppt.zip & http://www.mekabay.com/methodology/cata.pps & http://www.mekabay.com/methodology/cata_pps.zip Anarchy and the Internet http://www.mekabay.com/ethics/anarchy.htm & http://www.mekabay.com/ethics/anarchy.pdf Anonymity and Pseudonymity in Cyberspace http://www.mekabay.com/overviews/anonpseudo.htm & http://www.mekabay.com/overviews/anonpseudo.pdf Assurance and Extortion, INFOSEC, Quality http://www.mekabay.com/opinion/qa_extortion.htm & http://www.mekabay.com/opinion/qa_extortion.pdf Audit Checklist, Facilities Security http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf Authentication and Authorization on the World Wide Web, Identification, http://www.mekabay.com/infosecmgmt/iaawww.pdf Authorization on the World Wide Web, Identification, Authentication and http://www.mekabay.com/infosecmgmt/iaawww.pdf

Upload: others

Post on 28-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

CYCLICAL KEYWORD INDEX TO PAPERS

ON THE MEKABAY.COM WEB SITE

Last updated 2008-11-30 15:31:00

1995, Information Warfare http://www.mekabay.com/overviews/infowar_1995.htm & http://www.mekabay.com/overviews/infowar_1995.pdf

2003, Tracking Changes in MS-Word http://www.mekabay.com/methodology/track_changes.ppt

About INFOSEC: A Security Veteran in a Bad Mood Dumps on Everyone, A Rant http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Abuse: The Blame Game, Prisoner http://www.mekabay.com/opinion/prisoner_abuse.htm & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Academic INFOSEC, Time for Industry to Support http://www.mekabay.com/opinion/endowed_chairs.htm & http://www.mekabay.com/opinion/endowed_chairs.pdf

Action, PSYOP in http://www.mekabay.com/opinion/psyop.htm & http://www.mekabay.com/opinion/psyop.pdf

Age of Information Warfare, Facilities Management in the http://www.mekabay.com/opsmgmt/facmgmt.htm & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Age of the Internet, Securing Your Business in the http://www.mekabay.com/infosecmgmt/securebusiness.htm & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Airport Safety http://www.mekabay.com/opinion/airport_safety.htm & http://www.mekabay.com/opinion/airport_safety.pdf

An Epistemological Conflict, Science and Non-Science: http://www.mekabay.com/opinion/science.htm & http://www.mekabay.com/opinion/science.pdf

Analysis &, CATA: Computer-Aided Thematic http://www.mekabay.com/methodology/cata_ppt.zip & http://www.mekabay.com/methodology/cata.pps & http://www.mekabay.com/methodology/cata_pps.zip

Anarchy and the Internet http://www.mekabay.com/ethics/anarchy.htm & http://www.mekabay.com/ethics/anarchy.pdf

Anonymity and Pseudonymity in Cyberspace http://www.mekabay.com/overviews/anonpseudo.htm & http://www.mekabay.com/overviews/anonpseudo.pdf

Assurance and Extortion, INFOSEC, Quality http://www.mekabay.com/opinion/qa_extortion.htm & http://www.mekabay.com/opinion/qa_extortion.pdf

Audit Checklist, Facilities Security http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Authentication and Authorization on the World Wide Web, Identification, http://www.mekabay.com/infosecmgmt/iaawww.pdf

Authorization on the World Wide Web, Identification, Authentication and http://www.mekabay.com/infosecmgmt/iaawww.pdf

Page 2: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Automation, Computer Envy: Essays on Office http://www.mekabay.com/opsmgmt/envy.htm & http://www.mekabay.com/opsmgmt/envy.pdf

Bad Information from the Web and the 'Net http://www.mekabay.com/cyberwatch/05bad_info.htm

Bad Mood Dumps on Everyone, A Rant About INFOSEC: A Security Veteran in a http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Be Criminal Hackers, Why Kids Shouldn't http://www.mekabay.com/ethics/kids_not_hack.htm & http://www.mekabay.com/ethics/kids_not_hack.pdf

Beginner's Guide, Logical Fallacies: A http://www.mekabay.com/overviews/logical_fallacies.htm & http://www.mekabay.com/overviews/logical_fallacies.pdf

Biblical Marriage Principles http://www.mekabay.com/opinion/biblical_behavior.htm & http://www.mekabay.com/opinion/biblical_behavior.pdf

Bits of Morality http://www.mekabay.com/ethics/bits_morality.ppt & http://www.mekabay.com/ethics/bits_morality.pdf

Blame Game, Prisoner Abuse: The http://www.mekabay.com/opinion/prisoner_abuse.htm & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Boot Camp, A New Recruit Writes Home From http://www.mekabay.com/opinion/boot_camp.htm & http://www.mekabay.com/opinion/boot_camp.pdf

Breach Investigations Report, Verizon Data http://www.mekabay.com/overviews/verizon_2008.pdf

Brief History of Computer Crime http://www.mekabay.com/overviews/history.pdf

Brute-Force Cracking Estimation http://www.mekabay.com/methodology/keyspace.xls

Budget, Security on a http://www.mekabay.com/infosecmgmt/security_budget.pdf & http://www.mekabay.com/infosecmgmt/security_budget.ppt & http://www.mekabay.com/infosecmgmt/security_budget.mp3

Business in the Age of the Internet, Securing Your http://www.mekabay.com/infosecmgmt/securebusiness.htm & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Camp, A New Recruit Writes Home From Boot http://www.mekabay.com/opinion/boot_camp.htm & http://www.mekabay.com/opinion/boot_camp.pdf

Canada is a Member of the NAACP, Why a White Jewish Guy from http://www.mekabay.com/opinion/naacp.htm & http://www.mekabay.com/opinion/naacp.pdf

Cantata, Napster http://www.mekabay.com/ethics/napster.htm & http://www.mekabay.com/ethics/napster.pdf

Cards and National Security, National Identification http://www.mekabay.com/opinion/id_cards_national_security.htm & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Careers in Information Security http://www.mekabay.com/overviews/careers.htm & http://www.mekabay.com/overviews/careers.pdf

CATA: Computer-Aided Thematic Analysis http://www.mekabay.com/methodology/cata_ppt.zip & http://www.mekabay.com/methodology/cata.pps & http://www.mekabay.com/methodology/cata_pps.zip

Page 3: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Center, Staffing the Data http://www.mekabay.com/opsmgmt/staffing.htm & http://www.mekabay.com/opsmgmt/staffing.pdf

Chain Letters and Hoaxes on the Internet, Stopping http://www.mekabay.com/infosecmgmt/stopchain.htm & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Chain Letters and Ponzi Schemes http://www.mekabay.com/cyberwatch/11chain.htm

Changes in MS-Word 2003, Tracking http://www.mekabay.com/methodology/track_changes.ppt

Chapter 1 – Introduction, Enterprise Security http://www.mekabay.com/overviews/ess_1.htm & http://www.mekabay.com/overviews/ess_1.pdf

Checklist, Facilities Security Audit http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Computer Crime Studies and Statistics v4, Understanding http://www.mekabay.com/methodology/crime_stats_methods.pdf & http://www.mekabay.com/methodology/crime_stats_methods.htm

Computer Crime, Brief History of http://www.mekabay.com/overviews/history.pdf

Computer Crime, Introduction to http://www.mekabay.com/overviews/crime.htm & http://www.mekabay.com/overviews/crime.pdf

Computer Envy: Essays on Office Automation http://www.mekabay.com/opsmgmt/envy.htm & http://www.mekabay.com/opsmgmt/envy.pdf

Computer Security Incident Response Team Management http://www.mekabay.com/infosecmgmt/csirtm.htm & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Computer Security: If Not Now, When?, Implementing http://www.mekabay.com/infosecmgmt/implementsec.htm & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Computer-Aided Thematic Analysis &, CATA: http://www.mekabay.com/methodology/cata_ppt.zip & http://www.mekabay.com/methodology/cata.pps & http://www.mekabay.com/methodology/cata_pps.zip

Computer-Crime Terms, Glossary of http://www.mekabay.com/overviews/glossary.htm & http://www.mekabay.com/overviews/glossary.pdf

Computers in, Crime, Use of http://www.mekabay.com/overviews/crime_use_of_computers_in.pdf

Conflict, Science and Non-Science: An Epistemological http://www.mekabay.com/opinion/science.htm & http://www.mekabay.com/opinion/science.pdf

Corrected Errors, Frequently http://www.mekabay.com/methodology/fce.pdf & http://www.mekabay.com/methodology/fce.htm

Cracking Estimation, Brute-Force http://www.mekabay.com/methodology/keyspace.xls

Crime Studies and Statistics v4, Understanding Computer http://www.mekabay.com/methodology/crime_stats_methods.pdf & http://www.mekabay.com/methodology/crime_stats_methods.htm

Crime, Brief History of Computer http://www.mekabay.com/overviews/history.pdf

Crime, Introduction to, Computer http://www.mekabay.com/overviews/crime.htm & http://www.mekabay.com/overviews/crime.pdf

Crime, Use of Computers in http://www.mekabay.com/overviews/crime_use_of_computers_in.pdf

Page 4: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Criminal Hackers, Why Kids Shouldn't Be http://www.mekabay.com/ethics/kids_not_hack.htm & http://www.mekabay.com/ethics/kids_not_hack.pdf

Criminal Hacking and Your Kids http://www.mekabay.com/cyberwatch/15hacking.htm

Critical Thinking and Disintermediation http://www.mekabay.com/opinion/critical_thinking.htm & http://www.mekabay.com/opinion/critical_thinking.pdf

Cyber-Safety for Everyone: from Kids to Elders http://www.mekabay.com/cyberwatch/cybersafety.pdf

Cybersex, Online Dating and http://www.mekabay.com/cyberwatch/02dating_cybersex.htm

Cyberspace, Anonymity and Pseudonymity in http://www.mekabay.com/overviews/anonpseudo.htm & http://www.mekabay.com/overviews/anonpseudo.pdf

Cyberspace, Eternity in http://www.mekabay.com/overviews/eternity.htm & http://www.mekabay.com/overviews/eternity.pdf

Cyberspace: Integrating Technology into our Moral Universe, Totem and Taboo in http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Data Breach Investigations Report, Verizon http://www.mekabay.com/overviews/verizon_2008.pdf

Data Center, Staffing the http://www.mekabay.com/opsmgmt/staffing.htm & http://www.mekabay.com/opsmgmt/staffing.pdf

Data Insecurity Saga, VA http://www.mekabay.com/infosecmgmt/vasaga.htm & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Dating and Cybersex, Online http://www.mekabay.com/cyberwatch/02dating_cybersex.htm

Decisions, Making Ethical http://www.mekabay.com/ethics/making_ethical_decisions.htm & http://www.mekabay.com/ethics/making_ethical_decisions.pdf

Degree, Mastering a Master's http://www.mekabay.com/overviews/mastering.pdf

Development, Information Security Resources for Professional http://www.mekabay.com/overviews/infosec_ed.pdf

Disintermediation, Critical Thinking and http://www.mekabay.com/opinion/critical_thinking.htm & http://www.mekabay.com/opinion/critical_thinking.pdf

Disk, Organizing and Safeguarding Information on http://www.mekabay.com/methodology/osiod.pdf & http://www.mekabay.com/methodology/osiod.htm

Don't Steal Software, Music and Video http://www.mekabay.com/cyberwatch/13theft.htm

Dreams of Security http://www.mekabay.com/overviews/voting.htm & http://www.mekabay.com/overviews/voting.pdf

Dumps on Everyone, A Rant About INFOSEC: A Security Veteran in a Bad Mood http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Elders, Cyber-Safety for Everyone: from Kids to http://www.mekabay.com/cyberwatch/cybersafety.pdf

E-mail Safely and Well, Using http://www.mekabay.com/infosecmgmt/emailsec.htm & http://www.mekabay.com/infosecmgmt/emailsec.pdf

Page 5: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

E-mail, Junk http://www.mekabay.com/cyberwatch/10junk.htm

Enemies, Hackers are http://www.mekabay.com/ethics/hackers_enemies.htm & http://www.mekabay.com/ethics/hackers_enemies.pdf

Enterprise Security Chapter 1 – Introduction http://www.mekabay.com/overviews/ess_1.htm & http://www.mekabay.com/overviews/ess_1.pdf

Envy: Essays on Office Automation, Computer http://www.mekabay.com/opsmgmt/envy.htm & http://www.mekabay.com/opsmgmt/envy.pdf

Epistemological Conflict, Science and Non-Science: An http://www.mekabay.com/opinion/science.htm & http://www.mekabay.com/opinion/science.pdf

Errors, Frequently Corrected http://www.mekabay.com/methodology/fce.pdf & http://www.mekabay.com/methodology/fce.htm

Espionage, Industrial http://www.mekabay.com/overviews/industrial_espionage.htm & http://www.mekabay.com/overviews/industrial_espionage.pdf

Essays on Office Automation, Computer Envy: http://www.mekabay.com/opsmgmt/envy.htm & http://www.mekabay.com/opsmgmt/envy.pdf

Estimation, Brute-Force Cracking http://www.mekabay.com/methodology/keyspace.xls

Eternity in Cyberspace http://www.mekabay.com/overviews/eternity.htm & http://www.mekabay.com/overviews/eternity.pdf

Ethical Decisions, Making http://www.mekabay.com/ethics/making_ethical_decisions.htm & http://www.mekabay.com/ethics/making_ethical_decisions.pdf

Everyone, A Rant About INFOSEC: A Security Veteran in a Bad Mood Dumps on http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Everyone: from Kids to Elders, Cyber-Safety for http://www.mekabay.com/cyberwatch/cybersafety.pdf

Extortion, INFOSEC, Quality Assurance and http://www.mekabay.com/opinion/qa_extortion.htm & http://www.mekabay.com/opinion/qa_extortion.pdf

Facilities Management in the Age of Information Warfare http://www.mekabay.com/opsmgmt/facmgmt.htm & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Facilities Security Audit Checklist http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Facilities Security http://www.mekabay.com/opsmgmt/facilities_security.htm & http://www.mekabay.com/opsmgmt/facilities_security.pdf

Factors in the Implementation of Information Security Policy, Social Psychology and INFOSEC: Psycho-Social http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Fallacies: A Beginner's Guide, Logical http://www.mekabay.com/overviews/logical_fallacies.htm & http://www.mekabay.com/overviews/logical_fallacies.pdf

Frequently Corrected Errors http://www.mekabay.com/methodology/fce.pdf & http://www.mekabay.com/methodology/fce.htm

Game, Prisoner Abuse: The Blame http://www.mekabay.com/opinion/prisoner_abuse.htm & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Page 6: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Gay Pride Parades, Why a Straight Married Guy Marches in http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Get Rich Quick? Not Likely. http://www.mekabay.com/cyberwatch/12get_rich.htm

Glossary of Computer-Crime Terms http://www.mekabay.com/overviews/glossary.htm & http://www.mekabay.com/overviews/glossary.pdf

Groups, Hate http://www.mekabay.com/cyberwatch/03hate.htm

Guide, Logical Fallacies: A Beginner's http://www.mekabay.com/overviews/logical_fallacies.htm & http://www.mekabay.com/overviews/logical_fallacies.pdf

Guide, What's Important for Information Security: A Manager's http://www.mekabay.com/infosecmgmt/mgrguidesec.htm & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Guy from Canada is a Member of the NAACP, Why a White Jewish http://www.mekabay.com/opinion/naacp.htm & http://www.mekabay.com/opinion/naacp.pdf

Guy Marches in Gay Pride Parades, Why a Straight Married http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Hackers are Enemies http://www.mekabay.com/ethics/hackers_enemies.htm & http://www.mekabay.com/ethics/hackers_enemies.pdf

Hackers, Why Kids Shouldn't Be Criminal http://www.mekabay.com/ethics/kids_not_hack.htm & http://www.mekabay.com/ethics/kids_not_hack.pdf

Hacking and Your Kids, Criminal http://www.mekabay.com/cyberwatch/15hacking.htm

Hate Groups http://www.mekabay.com/cyberwatch/03hate.htm

Hexad, Parkerian http://www.mekabay.com/overviews/hexad.ppt & http://www.mekabay.com/overviews/hexad.ppsx

High-Pressure Scam http://www.mekabay.com/cyberwatch/16high-pressure_scam.htm

High-Pressure Scam http://www.mekabay.com/opsmgmt/scam.htm & http://www.mekabay.com/opsmgmt/scam.pdf

History of Computer Crime, Brief http://www.mekabay.com/overviews/history.pdf

Hoaxes and Myths Online http://www.mekabay.com/cyberwatch/06myths.htm

Hoaxes on the Internet, Stopping Chain Letters and http://www.mekabay.com/infosecmgmt/stopchain.htm & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Hoaxes, Virus http://www.mekabay.com/cyberwatch/07virus_hoaxes.htm

Home From Boot Camp, A New Recruit Writes http://www.mekabay.com/opinion/boot_camp.htm & http://www.mekabay.com/opinion/boot_camp.pdf

Identification Cards and National Security, National http://www.mekabay.com/opinion/id_cards_national_security.htm & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Page 7: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Identification, Authentication and Authorization on the World Wide Web http://www.mekabay.com/infosecmgmt/iaawww.pdf

If Not Now, When?, Implementing Computer Security: http://www.mekabay.com/infosecmgmt/implementsec.htm & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Implementation of Information Security Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Implementing Computer Security: If Not Now, When? http://www.mekabay.com/infosecmgmt/implementsec.htm & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Important for Information Security: A Manager's Guide, What's http://www.mekabay.com/infosecmgmt/mgrguidesec.htm & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Incident Response Team Management, Computer Security http://www.mekabay.com/infosecmgmt/csirtm.htm & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Industrial Espionage http://www.mekabay.com/overviews/industrial_espionage.htm & http://www.mekabay.com/overviews/industrial_espionage.pdf

Industry to Support Academic INFOSEC, Time for http://www.mekabay.com/opinion/endowed_chairs.htm & http://www.mekabay.com/opinion/endowed_chairs.pdf

Informatics Security, Medical http://www.mekabay.com/overviews/medical.htm & http://www.mekabay.com/overviews/medical.pdf

Information from the Web and the 'Net, Bad http://www.mekabay.com/cyberwatch/05bad_info.htm

Information on Disk, Organizing and Safeguarding http://www.mekabay.com/methodology/osiod.pdf & http://www.mekabay.com/methodology/osiod.htm

Information Security Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Information Security Resources for Professional Development http://www.mekabay.com/overviews/infosec_ed.pdf

Information Security, Careers in http://www.mekabay.com/overviews/careers.htm & http://www.mekabay.com/overviews/careers.pdf

Information Security, Net Present Value of http://www.mekabay.com/infosecmgmt/npvsec.htm & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Information Security: A Manager's Guide, What's Important for http://www.mekabay.com/infosecmgmt/mgrguidesec.htm & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Information Warfare -1995 http://www.mekabay.com/overviews/infowar_1995.htm & http://www.mekabay.com/overviews/infowar_1995.pdf

Information Warfare, Facilities Management in the Age of http://www.mekabay.com/opsmgmt/facmgmt.htm & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Page 8: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

INFOSEC, Personnel Management and http://www.mekabay.com/infosecmgmt/personnel.htm & http://www.mekabay.com/infosecmgmt/personnel.pdf

INFOSEC, Quality Assurance and Extortion http://www.mekabay.com/opinion/qa_extortion.htm & http://www.mekabay.com/opinion/qa_extortion.pdf

INFOSEC, Time for Industry to Support Academic http://www.mekabay.com/opinion/endowed_chairs.htm & http://www.mekabay.com/opinion/endowed_chairs.pdf

INFOSEC: A Security Veteran in a Bad Mood Dumps on Everyone, A Rant About http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

INFOSEC: Psycho-Social Factors in the Implementation of Information Security Policy, Social Psychology and http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Infrastructure, A Primer on, Public Key http://www.mekabay.com/overviews/pki.htm & http://www.mekabay.com/overviews/pki.pdf

Insecurity Saga, VA Data http://www.mekabay.com/infosecmgmt/vasaga.htm & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Integrating Technology into our Moral Universe, Totem and Taboo in Cyberspace: http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Internet, Anarchy and the http://www.mekabay.com/ethics/anarchy.htm & http://www.mekabay.com/ethics/anarchy.pdf

Internet, Pedophiles on the http://www.mekabay.com/cyberwatch/01pedophiles.htm

Internet, Securing Your Business in the Age of the http://www.mekabay.com/infosecmgmt/securebusiness.htm & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Internet, Stopping Chain Letters and Hoaxes on the http://www.mekabay.com/infosecmgmt/stopchain.htm & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Introduction to, Computer Crime, http://www.mekabay.com/overviews/crime.htm & http://www.mekabay.com/overviews/crime.pdf

Introduction, Enterprise Security Chapter 1 – http://www.mekabay.com/overviews/ess_1.htm & http://www.mekabay.com/overviews/ess_1.pdf

Introduction, Enterprise Security Chapter 1 http://www.mekabay.com/overviews/ess_1.htm & http://www.mekabay.com/overviews/ess_1.pdf

Investigations Report, Verizon Data Breach http://www.mekabay.com/overviews/verizon_2008.pdf

Jewish Guy from Canada is a Member of the NAACP, Why a White http://www.mekabay.com/opinion/naacp.htm & http://www.mekabay.com/opinion/naacp.pdf

Junk E-mail http://www.mekabay.com/cyberwatch/10junk.htm

Key Infrastructure, A Primer on, Public http://www.mekabay.com/overviews/pki.htm & http://www.mekabay.com/overviews/pki.pdf

Kids Shouldn't Be Criminal Hackers, Why http://www.mekabay.com/ethics/kids_not_hack.htm & http://www.mekabay.com/ethics/kids_not_hack.pdf

Page 9: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Kids to Elders, Cyber-Safety for Everyone: from http://www.mekabay.com/cyberwatch/cybersafety.pdf

Kids, Criminal Hacking and Your http://www.mekabay.com/cyberwatch/15hacking.htm

Knowing, On Not http://www.mekabay.com/opinion/not_knowing.htm & http://www.mekabay.com/opinion/not_knowing.pdf

learning), SQ3R (method for organized study and http://www.mekabay.com/methodology/sq3r.pdf & http://www.mekabay.com/methodology/sq3r.htm

Letters and Hoaxes on the Internet, Stopping Chain http://www.mekabay.com/infosecmgmt/stopchain.htm & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Letters and Ponzi Schemes, Chain http://www.mekabay.com/cyberwatch/11chain.htm

Life of Teaching, On a http://www.mekabay.com/opinion/teaching.htm & http://www.mekabay.com/opinion/teaching.pdf

Likely., Get Rich Quick? Not http://www.mekabay.com/cyberwatch/12get_rich.htm

Logical Fallacies: A Beginner's Guide http://www.mekabay.com/overviews/logical_fallacies.htm & http://www.mekabay.com/overviews/logical_fallacies.pdf

Making Ethical Decisions http://www.mekabay.com/ethics/making_ethical_decisions.htm & http://www.mekabay.com/ethics/making_ethical_decisions.pdf

Malicious Software http://www.mekabay.com/cyberwatch/09malware.htm

Management and INFOSEC, Personnel http://www.mekabay.com/infosecmgmt/personnel.htm & http://www.mekabay.com/infosecmgmt/personnel.pdf

Management in the Age of Information Warfare, Facilities http://www.mekabay.com/opsmgmt/facmgmt.htm & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Management, Computer Security Incident Response Team http://www.mekabay.com/infosecmgmt/csirtm.htm & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Manager's Guide, What's Important for Information Security: A http://www.mekabay.com/infosecmgmt/mgrguidesec.htm & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Marches in Gay Pride Parades, Why a Straight Married Guy http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Marriage Principles, Biblical http://www.mekabay.com/opinion/biblical_behavior.htm & http://www.mekabay.com/opinion/biblical_behavior.pdf

Marriage, REALLY Traditional http://www.mekabay.com/opinion/traditional_marriage.htm & http://www.mekabay.com/opinion/traditional_marriage.pdf

Married Guy Marches in Gay Pride Parades, Why a Straight http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Mastering a Master's Degree http://www.mekabay.com/overviews/mastering.pdf

Page 10: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Master's Degree, Mastering a http://www.mekabay.com/overviews/mastering.pdf

Medical Informatics Security http://www.mekabay.com/overviews/medical.htm & http://www.mekabay.com/overviews/medical.pdf

Member of the NAACP, Why a White Jewish Guy from Canada is a http://www.mekabay.com/opinion/naacp.htm & http://www.mekabay.com/opinion/naacp.pdf

method for organized study and learning, SQ3R http://www.mekabay.com/methodology/sq3r.pdf & http://www.mekabay.com/methodology/sq3r.htm

Mood Dumps on Everyone, A Rant About INFOSEC: A Security Veteran in a Bad http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Moral Universe, Totem and Taboo in Cyberspace: Integrating Technology into our http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Morality, Bits of http://www.mekabay.com/ethics/bits_morality.ppt & http://www.mekabay.com/ethics/bits_morality.pdf

MS-Word 2003, Tracking Changes in http://www.mekabay.com/methodology/track_changes.ppt

MS-WORD, Tips for Using http://www.mekabay.com/methodology/word_tips.pdf

Music and Video, Don't Steal Software, http://www.mekabay.com/cyberwatch/13theft.htm

Music or Videos, Seven Reasons Not to Steal Software, http://www.mekabay.com/ethics/seven_reasons.htm & http://www.mekabay.com/ethics/seven_reasons.pdf

Myths Online, Hoaxes and http://www.mekabay.com/cyberwatch/06myths.htm

NAACP, Why a White Jewish Guy from Canada is a Member of the http://www.mekabay.com/opinion/naacp.htm & http://www.mekabay.com/opinion/naacp.pdf

Napster Cantata http://www.mekabay.com/ethics/napster.htm & http://www.mekabay.com/ethics/napster.pdf

National Identification Cards and National Security http://www.mekabay.com/opinion/id_cards_national_security.htm & http://www.mekabay.com/opinion/id_cards_national_security.pdf

National Security, National Identification Cards and http://www.mekabay.com/opinion/id_cards_national_security.htm & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Net Neutrality http://www.mekabay.com/opinion/net_neutrality.htm & http://www.mekabay.com/opinion/net_neutrality.pdf

Net Present Value of Information Security http://www.mekabay.com/infosecmgmt/npvsec.htm & http://www.mekabay.com/infosecmgmt/npvsec.pdf

'Net, Bad Information from the Web and the http://www.mekabay.com/cyberwatch/05bad_info.htm

Neutrality, Net http://www.mekabay.com/opinion/net_neutrality.htm & http://www.mekabay.com/opinion/net_neutrality.pdf

New Recruit Writes Home From Boot Camp, A http://www.mekabay.com/opinion/boot_camp.htm & http://www.mekabay.com/opinion/boot_camp.pdf

Page 11: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Non-Science: An Epistemological Conflict, Science and http://www.mekabay.com/opinion/science.htm & http://www.mekabay.com/opinion/science.pdf

Not Knowing, On http://www.mekabay.com/opinion/not_knowing.htm & http://www.mekabay.com/opinion/not_knowing.pdf

Not Likely., Get Rich Quick? http://www.mekabay.com/cyberwatch/12get_rich.htm

Not Now, When?, Implementing Computer Security: If http://www.mekabay.com/infosecmgmt/implementsec.htm & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Not Speech, Viruses Are http://www.mekabay.com/opinion/virus_not_speech.htm & http://www.mekabay.com/opinion/virus_not_speech.pdf

Not to Steal Software, Music or Videos, Seven Reasons http://www.mekabay.com/ethics/seven_reasons.htm & http://www.mekabay.com/ethics/seven_reasons.pdf

Now, When?, Implementing Computer Security: If Not http://www.mekabay.com/infosecmgmt/implementsec.htm & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Office Automation, Computer Envy: Essays on http://www.mekabay.com/opsmgmt/envy.htm & http://www.mekabay.com/opsmgmt/envy.pdf

on a Budget, Security http://www.mekabay.com/infosecmgmt/security_budget.pdf & http://www.mekabay.com/infosecmgmt/security_budget.ppt & http://www.mekabay.com/infosecmgmt/security_budget.mp3

On a Life of Teaching http://www.mekabay.com/opinion/teaching.htm & http://www.mekabay.com/opinion/teaching.pdf

on Disk, Organizing and Safeguarding Information http://www.mekabay.com/methodology/osiod.pdf & http://www.mekabay.com/methodology/osiod.htm

on Everyone, A Rant About INFOSEC: A Security Veteran in a Bad Mood Dumps http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

On Not Knowing http://www.mekabay.com/opinion/not_knowing.htm & http://www.mekabay.com/opinion/not_knowing.pdf

on Office Automation, Computer Envy: Essays http://www.mekabay.com/opsmgmt/envy.htm & http://www.mekabay.com/opsmgmt/envy.pdf

on the Internet, Pedophiles http://www.mekabay.com/cyberwatch/01pedophiles.htm

on the Internet, Stopping Chain Letters and Hoaxes http://www.mekabay.com/infosecmgmt/stopchain.htm & http://www.mekabay.com/infosecmgmt/stopchain.pdf

on the World Wide Web, Identification, Authentication and Authorization http://www.mekabay.com/infosecmgmt/iaawww.pdf

On Writing http://www.mekabay.com/methodology/writing.pdf & http://www.mekabay.com/methodology/writing.htm

on, Public Key Infrastructure, A Primer http://www.mekabay.com/overviews/pki.htm & http://www.mekabay.com/overviews/pki.pdf

Online Dating and Cybersex http://www.mekabay.com/cyberwatch/02dating_cybersex.htm

Online, Hoaxes and Myths http://www.mekabay.com/cyberwatch/06myths.htm

Online, Plagiarism http://www.mekabay.com/cyberwatch/14plagiarism.htm

Page 12: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Online, Pornography http://www.mekabay.com/cyberwatch/04porn.htm

Ops Security, Review of Visible http://www.mekabay.com/opsmgmt/vos.pdf

organized study and learning), SQ3R (method for http://www.mekabay.com/methodology/sq3r.pdf & http://www.mekabay.com/methodology/sq3r.htm

Organizing and Safeguarding Information on Disk http://www.mekabay.com/methodology/osiod.pdf & http://www.mekabay.com/methodology/osiod.htm

Others, Threats to You and to http://www.mekabay.com/cyberwatch/08threats.htm

our Moral Universe, Totem and Taboo in Cyberspace: Integrating Technology into http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Parades, Why a Straight Married Guy Marches in Gay Pride http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Parkerian Hexad http://www.mekabay.com/overviews/hexad.ppt & http://www.mekabay.com/overviews/hexad.ppsx

Pedophiles on the Internet http://www.mekabay.com/cyberwatch/01pedophiles.htm

Personnel Management and INFOSEC http://www.mekabay.com/infosecmgmt/personnel.htm & http://www.mekabay.com/infosecmgmt/personnel.pdf

PGP, Using http://www.mekabay.com/overviews/using_pgp.ppt

Plagiarism Online http://www.mekabay.com/cyberwatch/14plagiarism.htm

Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information Security http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Ponzi Schemes, Chain Letters and http://www.mekabay.com/cyberwatch/11chain.htm

Pornography Online http://www.mekabay.com/cyberwatch/04porn.htm

Present Value of Information Security, Net http://www.mekabay.com/infosecmgmt/npvsec.htm & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Pride Parades, Why a Straight Married Guy Marches in Gay http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Primer on, Public Key Infrastructure, A http://www.mekabay.com/overviews/pki.htm & http://www.mekabay.com/overviews/pki.pdf

Principles, Biblical Marriage http://www.mekabay.com/opinion/biblical_behavior.htm & http://www.mekabay.com/opinion/biblical_behavior.pdf

Prisoner Abuse: The Blame Game http://www.mekabay.com/opinion/prisoner_abuse.htm & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Professional Development, Information Security Resources for http://www.mekabay.com/overviews/infosec_ed.pdf

Page 13: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Programming for Security http://www.mekabay.com/overviews/programming.htm & http://www.mekabay.com/overviews/programming.pdf

Pseudonymity in Cyberspace, Anonymity and http://www.mekabay.com/overviews/anonpseudo.htm & http://www.mekabay.com/overviews/anonpseudo.pdf

Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information Security Policy, Social http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Psycho-Social Factors in the Implementation of Information Security Policy, Social Psychology and INFOSEC: http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

PSYOP in Action http://www.mekabay.com/opinion/psyop.htm & http://www.mekabay.com/opinion/psyop.pdf

Public Key Infrastructure, A Primer on http://www.mekabay.com/overviews/pki.htm & http://www.mekabay.com/overviews/pki.pdf

Quality Assurance and Extortion, INFOSEC, http://www.mekabay.com/opinion/qa_extortion.htm & http://www.mekabay.com/opinion/qa_extortion.pdf

Quick? Not Likely., Get Rich http://www.mekabay.com/cyberwatch/12get_rich.htm

Rant About INFOSEC: A Security Veteran in a Bad Mood Dumps on Everyone, A http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

REALLY Traditional Marriage http://www.mekabay.com/opinion/traditional_marriage.htm & http://www.mekabay.com/opinion/traditional_marriage.pdf

Reasons Not to Steal Software, Music or Videos, Seven http://www.mekabay.com/ethics/seven_reasons.htm & http://www.mekabay.com/ethics/seven_reasons.pdf

Recruit Writes Home From Boot Camp, A New http://www.mekabay.com/opinion/boot_camp.htm & http://www.mekabay.com/opinion/boot_camp.pdf

Report, Verizon Data Breach Investigations http://www.mekabay.com/overviews/verizon_2008.pdf

Resources for Professional Development, Information Security http://www.mekabay.com/overviews/infosec_ed.pdf

Response Team Management, Computer Security Incident http://www.mekabay.com/infosecmgmt/csirtm.htm & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Review of Visible Ops Security http://www.mekabay.com/opsmgmt/vos.pdf

Rich Quick? Not Likely., Get http://www.mekabay.com/cyberwatch/12get_rich.htm

Safeguarding Information on Disk, Organizing and http://www.mekabay.com/methodology/osiod.pdf & http://www.mekabay.com/methodology/osiod.htm

Safely and Well, Using E-mail http://www.mekabay.com/infosecmgmt/emailsec.htm & http://www.mekabay.com/infosecmgmt/emailsec.pdf

Page 14: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Safety, Airport http://www.mekabay.com/opinion/airport_safety.htm & http://www.mekabay.com/opinion/airport_safety.pdf

Saga, VA Data Insecurity http://www.mekabay.com/infosecmgmt/vasaga.htm & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Scam, High-Pressure http://www.mekabay.com/cyberwatch/16high-pressure_scam.htm

Scam, High-Pressure http://www.mekabay.com/opsmgmt/scam.htm & http://www.mekabay.com/opsmgmt/scam.pdf

Schemes, Chain Letters and Ponzi http://www.mekabay.com/cyberwatch/11chain.htm

Science and Non-Science: An Epistemological Conflict http://www.mekabay.com/opinion/science.htm & http://www.mekabay.com/opinion/science.pdf

Securing Your Business in the Age of the Internet http://www.mekabay.com/infosecmgmt/securebusiness.htm & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Security Audit Checklist, Facilities http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Security Chapter 1 – Introduction, Enterprise http://www.mekabay.com/overviews/ess_1.htm & http://www.mekabay.com/overviews/ess_1.pdf

Security Incident Response Team Management, Computer http://www.mekabay.com/infosecmgmt/csirtm.htm & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Security on a Budget http://www.mekabay.com/infosecmgmt/security_budget.pdf & http://www.mekabay.com/infosecmgmt/security_budget.ppt & http://www.mekabay.com/infosecmgmt/security_budget.mp3

Security on a Budget http://www.mekabay.com/infosecmgmt/security_budget.pdf & http://www.mekabay.com/infosecmgmt/security_budget.ppt & http://www.mekabay.com/infosecmgmt/security_budget.mp3

Security Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Security Resources for Professional Development, Information http://www.mekabay.com/overviews/infosec_ed.pdf

Security Veteran in a Bad Mood Dumps on Everyone, A Rant About INFOSEC: A http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Security, Careers in Information http://www.mekabay.com/overviews/careers.htm & http://www.mekabay.com/overviews/careers.pdf

Security, Dreams of http://www.mekabay.com/overviews/voting.htm & http://www.mekabay.com/overviews/voting.pdf

Security, Facilities http://www.mekabay.com/opsmgmt/facilities_security.htm & http://www.mekabay.com/opsmgmt/facilities_security.pdf

Security, Medical Informatics http://www.mekabay.com/overviews/medical.htm & http://www.mekabay.com/overviews/medical.pdf

Security, National Identification Cards and National http://www.mekabay.com/opinion/id_cards_national_security.htm & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Security, Net Present Value of Information http://www.mekabay.com/infosecmgmt/npvsec.htm & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Page 15: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Security, Programming for http://www.mekabay.com/overviews/programming.htm & http://www.mekabay.com/overviews/programming.pdf

Security, Review of Visible Ops http://www.mekabay.com/opsmgmt/vos.pdf

Security: A Manager's Guide, What's Important for Information http://www.mekabay.com/infosecmgmt/mgrguidesec.htm & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Security: If Not Now, When?, Implementing Computer http://www.mekabay.com/infosecmgmt/implementsec.htm & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Seven Reasons Not to Steal Software, Music or Videos http://www.mekabay.com/ethics/seven_reasons.htm & http://www.mekabay.com/ethics/seven_reasons.pdf

Shouldn't Be Criminal Hackers, Why Kids http://www.mekabay.com/ethics/kids_not_hack.htm & http://www.mekabay.com/ethics/kids_not_hack.pdf

Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information Security Policy http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Software, Malicious http://www.mekabay.com/cyberwatch/09malware.htm

Software, Music and Video, Don't Steal http://www.mekabay.com/cyberwatch/13theft.htm

Software, Music or Videos, Seven Reasons Not to Steal http://www.mekabay.com/ethics/seven_reasons.htm & http://www.mekabay.com/ethics/seven_reasons.pdf

Speech, Viruses Are Not http://www.mekabay.com/opinion/virus_not_speech.htm & http://www.mekabay.com/opinion/virus_not_speech.pdf

SQ3R (method for organized study and learning) http://www.mekabay.com/methodology/sq3r.pdf & http://www.mekabay.com/methodology/sq3r.htm

Staffing the Data Center http://www.mekabay.com/opsmgmt/staffing.htm & http://www.mekabay.com/opsmgmt/staffing.pdf

Statistics v4, Understanding Computer Crime Studies and http://www.mekabay.com/methodology/crime_stats_methods.pdf & http://www.mekabay.com/methodology/crime_stats_methods.htm

Steal Software, Music and Video, Don't http://www.mekabay.com/cyberwatch/13theft.htm

Steal Software, Music or Videos, Seven Reasons Not to http://www.mekabay.com/ethics/seven_reasons.htm & http://www.mekabay.com/ethics/seven_reasons.pdf

Stopping Chain Letters and Hoaxes on the Internet http://www.mekabay.com/infosecmgmt/stopchain.htm & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Straight Married Guy Marches in Gay Pride Parades, Why a http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Studies and Statistics v4, Understanding Computer Crime http://www.mekabay.com/methodology/crime_stats_methods.pdf & http://www.mekabay.com/methodology/crime_stats_methods.htm

Page 16: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

study and learning), SQ3R (method for organized http://www.mekabay.com/methodology/sq3r.pdf & http://www.mekabay.com/methodology/sq3r.htm

superior, Velocihackers and Tyrannosaurus http://www.mekabay.com/infosecmgmt/velocihackers.htm & http://www.mekabay.com/infosecmgmt/velocihackers.pdf

Support Academic INFOSEC, Time for Industry to http://www.mekabay.com/opinion/endowed_chairs.htm & http://www.mekabay.com/opinion/endowed_chairs.pdf

Taboo in Cyberspace: Integrating Technology into our Moral Universe, Totem and http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Teaching, On a Life of http://www.mekabay.com/opinion/teaching.htm & http://www.mekabay.com/opinion/teaching.pdf

Team Management, Computer Security Incident Response http://www.mekabay.com/infosecmgmt/csirtm.htm & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Technology into our Moral Universe, Totem and Taboo in Cyberspace: Integrating http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Terms, Glossary of Computer-Crime http://www.mekabay.com/overviews/glossary.htm & http://www.mekabay.com/overviews/glossary.pdf

the Age of Information Warfare, Facilities Management in http://www.mekabay.com/opsmgmt/facmgmt.htm & http://www.mekabay.com/opsmgmt/facmgmt.pdf

the Age of the Internet, Securing Your Business in http://www.mekabay.com/infosecmgmt/securebusiness.htm & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

The Blame Game, Prisoner Abuse: http://www.mekabay.com/opinion/prisoner_abuse.htm & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Thematic Analysis &, CATA: Computer-Aided http://www.mekabay.com/methodology/cata_ppt.zip & http://www.mekabay.com/methodology/cata.pps & http://www.mekabay.com/methodology/cata_pps.zip

Thinking and Disintermediation, Critical http://www.mekabay.com/opinion/critical_thinking.htm & http://www.mekabay.com/opinion/critical_thinking.pdf

Threats to You and to Others http://www.mekabay.com/cyberwatch/08threats.htm

Time for Industry to Support Academic INFOSEC http://www.mekabay.com/opinion/endowed_chairs.htm & http://www.mekabay.com/opinion/endowed_chairs.pdf

Tips for Using MS-WORD http://www.mekabay.com/methodology/word_tips.pdf

Totem and Taboo in Cyberspace: Integrating Technology into our Moral Universe http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Tracking Changes in MS-Word 2003 http://www.mekabay.com/methodology/track_changes.ppt

Page 17: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Traditional Marriage, REALLY http://www.mekabay.com/opinion/traditional_marriage.htm & http://www.mekabay.com/opinion/traditional_marriage.pdf

Tyrannosaurus superior, Velocihackers and http://www.mekabay.com/infosecmgmt/velocihackers.htm & http://www.mekabay.com/infosecmgmt/velocihackers.pdf

Understanding Computer Crime Studies and Statistics v4 http://www.mekabay.com/methodology/crime_stats_methods.pdf & http://www.mekabay.com/methodology/crime_stats_methods.htm

Universe, Totem and Taboo in Cyberspace: Integrating Technology into our Moral http://www.mekabay.com/ethics/totem_taboo_cyber.htm & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Use of Computers in, Crime, http://www.mekabay.com/overviews/crime_use_of_computers_in.pdf

Using E-mail Safely and Well http://www.mekabay.com/infosecmgmt/emailsec.htm & http://www.mekabay.com/infosecmgmt/emailsec.pdf

Using MS-WORD, Tips for http://www.mekabay.com/methodology/word_tips.pdf

Using PGP http://www.mekabay.com/overviews/using_pgp.ppt

VA Data Insecurity Saga http://www.mekabay.com/infosecmgmt/vasaga.htm & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Value of Information Security, Net Present http://www.mekabay.com/infosecmgmt/npvsec.htm & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Velocihackers and Tyrannosaurus superior http://www.mekabay.com/infosecmgmt/velocihackers.htm & http://www.mekabay.com/infosecmgmt/velocihackers.pdf

Verizon Data Breach Investigations Report http://www.mekabay.com/overviews/verizon_2008.pdf

Veteran in a Bad Mood Dumps on Everyone, A Rant About INFOSEC: A Security http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Video, Don't Steal Software, Music and http://www.mekabay.com/cyberwatch/13theft.htm

Videos, Seven Reasons Not to Steal Software, Music or http://www.mekabay.com/ethics/seven_reasons.htm & http://www.mekabay.com/ethics/seven_reasons.pdf

Virus Hoaxes http://www.mekabay.com/cyberwatch/07virus_hoaxes.htm

Viruses Are Not Speech http://www.mekabay.com/opinion/virus_not_speech.htm & http://www.mekabay.com/opinion/virus_not_speech.pdf

Visible Ops Security, Review of http://www.mekabay.com/opsmgmt/vos .pdf

Warfare -1995, Information http://www.mekabay.com/overviews/infowar_1995.htm & http://www.mekabay.com/overviews/infowar_1995.pdf

Warfare, Facilities Management in the Age of Information http://www.mekabay.com/opsmgmt/facmgmt.htm & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Web and the 'Net, Bad Information from the http://www.mekabay.com/cyberwatch/05bad_info.htm

Page 18: Files on Web site · 2012-11-19 · Gay Pride Parades, Why a Straight Married Guy Marches in  &

Web, Identification, Authentication and Authorization on the World Wide http://www.mekabay.com/infosecmgmt/iaawww.pdf

Well, Using E-mail Safely and http://www.mekabay.com/infosecmgmt/emailsec.htm & http://www.mekabay.com/infosecmgmt/emailsec.pdf

What's Important for Information Security: A Manager's Guide http://www.mekabay.com/infosecmgmt/mgrguidesec.htm & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

When?, Implementing Computer Security: If Not Now, http://www.mekabay.com/infosecmgmt/implementsec.htm & http://www.mekabay.com/infosecmgmt/implementsec.pdf

White Jewish Guy from Canada is a Member of the NAACP, Why a http://www.mekabay.com/opinion/naacp.htm & http://www.mekabay.com/opinion/naacp.pdf

Why a Straight Married Guy Marches in Gay Pride Parades http://www.mekabay.com/opinion/gay_pride.htm & http://www.mekabay.com/opinion/gay_pride.pdf

Why a White Jewish Guy from Canada is a Member of the NAACP http://www.mekabay.com/opinion/naacp.htm & http://www.mekabay.com/opinion/naacp.pdf

Why Kids Shouldn't Be Criminal Hackers http://www.mekabay.com/ethics/kids_not_hack.htm & http://www.mekabay.com/ethics/kids_not_hack.pdf

Wide Web, Identification, Authentication and Authorization on the World http://www.mekabay.com/infosecmgmt/iaawww.pdf

World Wide Web, Identification, Authentication and Authorization on the http://www.mekabay.com/infosecmgmt/iaawww.pdf

Writes Home From Boot Camp, A New Recruit http://www.mekabay.com/opinion/boot_camp.htm & http://www.mekabay.com/opinion/boot_camp.pdf

Writing, On http://www.mekabay.com/methodology/writing.pdf & http://www.mekabay.com/methodology/writing.htm

You and to Others, Threats to http://www.mekabay.com/cyberwatch/08threats.htm

Your Business in the Age of the Internet, Securing http://www.mekabay.com/infosecmgmt/securebusiness.htm & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Your Kids, Criminal Hacking and http://www.mekabay.com/cyberwatch/15hacking.htm