Editorial Policies

Focus and Scope

Information security and risk management
Ethical hacking
Operating system security
Windows security
Object oriented design
Security architecture
Computer forensics
Reverse engineering
Web application penetration testing
Compliance and operational security
Threats and vulnerabilities
Application, data and host security
Access control and identity management
Cryptography

 

Section Policies

Articles

Checked Open Submissions Checked Indexed Checked Peer Reviewed
 

Issue Purchase

Readers without a subscription may still purchase individual issues. The following payment options and fees are available.

Purchase Issue: 90.00 (USD)

The payment of this fee will enable you to view, download, and print this Issue.

 

Article Purchase

Readers without a subscription may still purchase individual articles. The following payment options and fees are available.

Purchase Article: 30.00 (USD)

The payment of this fee will enable you to view, download, and print this article.