CYCLICAL KEYWORD INDEX TO PAPERS
ON THE MEKABAY.COM WEB SITE

Last updated 2008-11-30 15:31:00

1995, Information Warfare      http://www.mekabay.com/overviews/infowar_1995.htm  & http://www.mekabay.com/overviews/infowar_1995.pdf

2003, Tracking Changes in MS-Word  http://www.mekabay.com/methodology/track_changes.ppt

About INFOSEC: A Security Veteran in a Bad Mood Dumps on Everyone, A Rant            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

Abuse: The Blame Game, Prisoner     http://www.mekabay.com/opinion/prisoner_abuse.htm  & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Academic INFOSEC, Time for Industry to Support  http://www.mekabay.com/opinion/endowed_chairs.htm  & http://www.mekabay.com/opinion/endowed_chairs.pdf

Action, PSYOP in       http://www.mekabay.com/opinion/psyop.htm  & http://www.mekabay.com/opinion/psyop.pdf

Age of Information Warfare, Facilities Management in the     http://www.mekabay.com/opsmgmt/facmgmt.htm  & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Age of the Internet, Securing Your Business in the     http://www.mekabay.com/infosecmgmt/securebusiness.htm  & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Airport Safety  http://www.mekabay.com/opinion/airport_safety.htm  & http://www.mekabay.com/opinion/airport_safety.pdf

An Epistemological Conflict, Science and Non-Science:        http://www.mekabay.com/opinion/science.htm  & http://www.mekabay.com/opinion/science.pdf

Analysis &, CATA: Computer-Aided Thematic          http://www.mekabay.com/methodology/cata_ppt.zip  & http://www.mekabay.com/methodology/cata.pps  & http://www.mekabay.com/methodology/cata_pps.zip

Anarchy and the Internet        http://www.mekabay.com/ethics/anarchy.htm  & http://www.mekabay.com/ethics/anarchy.pdf

Anonymity and Pseudonymity in Cyberspace  http://www.mekabay.com/overviews/anonpseudo.htm  & http://www.mekabay.com/overviews/anonpseudo.pdf

Assurance and Extortion, INFOSEC, Quality            http://www.mekabay.com/opinion/qa_extortion.htm  & http://www.mekabay.com/opinion/qa_extortion.pdf

Audit Checklist, Facilities Security     http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Authentication and Authorization on the World Wide Web, Identification,            http://www.mekabay.com/infosecmgmt/iaawww.pdf

Authorization on the World Wide Web, Identification, Authentication and            http://www.mekabay.com/infosecmgmt/iaawww.pdf

Automation, Computer Envy: Essays on Office         http://www.mekabay.com/opsmgmt/envy.htm  & http://www.mekabay.com/opsmgmt/envy.pdf

Bad Information from the Web and the 'Net   http://www.mekabay.com/cyberwatch/05bad_info.htm

Bad Mood Dumps on Everyone, A Rant About INFOSEC: A Security Veteran in a            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

Be Criminal Hackers, Why Kids Shouldn't      http://www.mekabay.com/ethics/kids_not_hack.htm  & http://www.mekabay.com/ethics/kids_not_hack.pdf

Beginner's Guide, Logical Fallacies: A            http://www.mekabay.com/overviews/logical_fallacies.htm  & http://www.mekabay.com/overviews/logical_fallacies.pdf

Biblical Marriage Principles     http://www.mekabay.com/opinion/biblical_behavior.htm  & http://www.mekabay.com/opinion/biblical_behavior.pdf

Bits of Morality           http://www.mekabay.com/ethics/bits_morality.ppt  & http://www.mekabay.com/ethics/bits_morality.pdf

Blame Game, Prisoner Abuse: The     http://www.mekabay.com/opinion/prisoner_abuse.htm  & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Boot Camp, A New Recruit Writes Home From         http://www.mekabay.com/opinion/boot_camp.htm  & http://www.mekabay.com/opinion/boot_camp.pdf

Breach Investigations Report, Verizon Data   http://www.mekabay.com/overviews/verizon_2008.pdf

Brief History of Computer Crime        http://www.mekabay.com/overviews/history.pdf

Brute-Force Cracking Estimation        http://www.mekabay.com/methodology/keyspace.xls

Budget, Security on a  http://www.mekabay.com/infosecmgmt/security_budget.pdf & http://www.mekabay.com/infosecmgmt/security_budget.ppt & http://www.mekabay.com/infosecmgmt/security_budget.mp3

Business in the Age of the Internet, Securing Your     http://www.mekabay.com/infosecmgmt/securebusiness.htm  & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Camp, A New Recruit Writes Home From Boot         http://www.mekabay.com/opinion/boot_camp.htm  & http://www.mekabay.com/opinion/boot_camp.pdf

Canada is a Member of the NAACP, Why a White Jewish Guy from  http://www.mekabay.com/opinion/naacp.htm  & http://www.mekabay.com/opinion/naacp.pdf

Cantata, Napster         http://www.mekabay.com/ethics/napster.htm  &             http://www.mekabay.com/ethics/napster.pdf

Cards and National Security, National Identification            http://www.mekabay.com/opinion/id_cards_national_security.htm  & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Careers in Information Security           http://www.mekabay.com/overviews/careers.htm  & http://www.mekabay.com/overviews/careers.pdf

CATA: Computer-Aided Thematic Analysis   http://www.mekabay.com/methodology/cata_ppt.zip  & http://www.mekabay.com/methodology/cata.pps  & http://www.mekabay.com/methodology/cata_pps.zip

Center, Staffing the Data         http://www.mekabay.com/opsmgmt/staffing.htm  & http://www.mekabay.com/opsmgmt/staffing.pdf

Chain Letters and Hoaxes on the Internet, Stopping   http://www.mekabay.com/infosecmgmt/stopchain.htm  & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Chain Letters and Ponzi Schemes       http://www.mekabay.com/cyberwatch/11chain.htm

Changes in MS-Word 2003, Tracking  http://www.mekabay.com/methodology/track_changes.ppt

Chapter 1 – Introduction, Enterprise Security            http://www.mekabay.com/overviews/ess_1.htm  & http://www.mekabay.com/overviews/ess_1.pdf

Checklist, Facilities Security Audit     http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Computer Crime Studies and Statistics v4, Understanding            http://www.mekabay.com/methodology/crime_stats_methods.pdf  & http://www.mekabay.com/methodology/crime_stats_methods.htm

Computer Crime, Brief History of       http://www.mekabay.com/overviews/history.pdf

Computer Crime, Introduction to        http://www.mekabay.com/overviews/crime.htm  & http://www.mekabay.com/overviews/crime.pdf

Computer Envy: Essays on Office Automation          http://www.mekabay.com/opsmgmt/envy.htm  & http://www.mekabay.com/opsmgmt/envy.pdf

Computer Security Incident Response Team Management     http://www.mekabay.com/infosecmgmt/csirtm.htm  & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Computer Security: If Not Now, When?, Implementing            http://www.mekabay.com/infosecmgmt/implementsec.htm  & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Computer-Aided Thematic Analysis &, CATA:          http://www.mekabay.com/methodology/cata_ppt.zip  & http://www.mekabay.com/methodology/cata.pps  & http://www.mekabay.com/methodology/cata_pps.zip

Computer-Crime Terms, Glossary of   http://www.mekabay.com/overviews/glossary.htm  & http://www.mekabay.com/overviews/glossary.pdf

Computers in, Crime, Use of   http://www.mekabay.com/overviews/crime_use_of_computers_in.pdf

Conflict, Science and Non-Science: An Epistemological        http://www.mekabay.com/opinion/science.htm  & http://www.mekabay.com/opinion/science.pdf

Corrected Errors, Frequently   http://www.mekabay.com/methodology/fce.pdf  & http://www.mekabay.com/methodology/fce.htm

Cracking Estimation, Brute-Force       http://www.mekabay.com/methodology/keyspace.xls

Crime Studies and Statistics v4, Understanding Computer            http://www.mekabay.com/methodology/crime_stats_methods.pdf  & http://www.mekabay.com/methodology/crime_stats_methods.htm

Crime, Brief History of Computer       http://www.mekabay.com/overviews/history.pdf

Crime, Introduction to, Computer       http://www.mekabay.com/overviews/crime.htm  & http://www.mekabay.com/overviews/crime.pdf

Crime, Use of Computers in    http://www.mekabay.com/overviews/crime_use_of_computers_in.pdf

Criminal Hackers, Why Kids Shouldn't Be      http://www.mekabay.com/ethics/kids_not_hack.htm  & http://www.mekabay.com/ethics/kids_not_hack.pdf

Criminal Hacking and Your Kids        http://www.mekabay.com/cyberwatch/15hacking.htm

Critical Thinking and Disintermediation         http://www.mekabay.com/opinion/critical_thinking.htm  & http://www.mekabay.com/opinion/critical_thinking.pdf

Cyber-Safety for Everyone: from Kids to Elders         http://www.mekabay.com/cyberwatch/cybersafety.pdf

Cybersex, Online Dating and  http://www.mekabay.com/cyberwatch/02dating_cybersex.htm

Cyberspace, Anonymity and Pseudonymity in http://www.mekabay.com/overviews/anonpseudo.htm  & http://www.mekabay.com/overviews/anonpseudo.pdf

Cyberspace, Eternity in           http://www.mekabay.com/overviews/eternity.htm  & http://www.mekabay.com/overviews/eternity.pdf

Cyberspace: Integrating Technology into our Moral Universe, Totem and Taboo in            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Data Breach Investigations Report, Verizon   http://www.mekabay.com/overviews/verizon_2008.pdf

Data Center, Staffing the         http://www.mekabay.com/opsmgmt/staffing.htm  & http://www.mekabay.com/opsmgmt/staffing.pdf

Data Insecurity Saga, VA        http://www.mekabay.com/infosecmgmt/vasaga.htm  & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Dating and Cybersex, Online  http://www.mekabay.com/cyberwatch/02dating_cybersex.htm

Decisions, Making Ethical      http://www.mekabay.com/ethics/making_ethical_decisions.htm  & http://www.mekabay.com/ethics/making_ethical_decisions.pdf

Degree, Mastering a Master's   http://www.mekabay.com/overviews/mastering.pdf

Development, Information Security Resources for Professional            http://www.mekabay.com/overviews/infosec_ed.pdf

Disintermediation, Critical Thinking and        http://www.mekabay.com/opinion/critical_thinking.htm  & http://www.mekabay.com/opinion/critical_thinking.pdf

Disk, Organizing and Safeguarding Information on    http://www.mekabay.com/methodology/osiod.pdf  & http://www.mekabay.com/methodology/osiod.htm

Don't Steal Software, Music and Video           http://www.mekabay.com/cyberwatch/13theft.htm

Dreams of Security      http://www.mekabay.com/overviews/voting.htm  & http://www.mekabay.com/overviews/voting.pdf

Dumps on Everyone, A Rant About INFOSEC: A Security Veteran in a Bad Mood            http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

Elders, Cyber-Safety for Everyone: from Kids to        http://www.mekabay.com/cyberwatch/cybersafety.pdf

E-mail Safely and Well, Using http://www.mekabay.com/infosecmgmt/emailsec.htm  & http://www.mekabay.com/infosecmgmt/emailsec.pdf

E-mail, Junk    http://www.mekabay.com/cyberwatch/10junk.htm

Enemies, Hackers are  http://www.mekabay.com/ethics/hackers_enemies.htm  & http://www.mekabay.com/ethics/hackers_enemies.pdf

Enterprise Security Chapter 1 – Introduction http://www.mekabay.com/overviews/ess_1.htm  & http://www.mekabay.com/overviews/ess_1.pdf

Envy: Essays on Office Automation, Computer         http://www.mekabay.com/opsmgmt/envy.htm  & http://www.mekabay.com/opsmgmt/envy.pdf

Epistemological Conflict, Science and Non-Science: An        http://www.mekabay.com/opinion/science.htm  & http://www.mekabay.com/opinion/science.pdf

Errors, Frequently Corrected   http://www.mekabay.com/methodology/fce.pdf  & http://www.mekabay.com/methodology/fce.htm

Espionage, Industrial  http://www.mekabay.com/overviews/industrial_espionage.htm  & http://www.mekabay.com/overviews/industrial_espionage.pdf

Essays on Office Automation, Computer Envy:         http://www.mekabay.com/opsmgmt/envy.htm  & http://www.mekabay.com/opsmgmt/envy.pdf

Estimation, Brute-Force Cracking       http://www.mekabay.com/methodology/keyspace.xls

Eternity in Cyberspace            http://www.mekabay.com/overviews/eternity.htm  & http://www.mekabay.com/overviews/eternity.pdf

Ethical Decisions, Making      http://www.mekabay.com/ethics/making_ethical_decisions.htm  & http://www.mekabay.com/ethics/making_ethical_decisions.pdf

Everyone, A Rant About INFOSEC: A Security Veteran in a Bad Mood Dumps on            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

Everyone: from Kids to Elders, Cyber-Safety for        http://www.mekabay.com/cyberwatch/cybersafety.pdf

Extortion, INFOSEC, Quality Assurance and            http://www.mekabay.com/opinion/qa_extortion.htm  & http://www.mekabay.com/opinion/qa_extortion.pdf

Facilities Management in the Age of Information Warfare      http://www.mekabay.com/opsmgmt/facmgmt.htm  & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Facilities Security Audit Checklist      http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Facilities Security        http://www.mekabay.com/opsmgmt/facilities_security.htm  & http://www.mekabay.com/opsmgmt/facilities_security.pdf

Factors in the Implementation of Information Security Policy, Social Psychology and INFOSEC: Psycho-Social            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm  & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Fallacies: A Beginner's Guide, Logical            http://www.mekabay.com/overviews/logical_fallacies.htm  & http://www.mekabay.com/overviews/logical_fallacies.pdf

Frequently Corrected Errors    http://www.mekabay.com/methodology/fce.pdf  & http://www.mekabay.com/methodology/fce.htm

Game, Prisoner Abuse: The Blame     http://www.mekabay.com/opinion/prisoner_abuse.htm  & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Gay Pride Parades, Why a Straight Married Guy Marches in   http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Get Rich Quick? Not Likely.   http://www.mekabay.com/cyberwatch/12get_rich.htm

Glossary of Computer-Crime Terms    http://www.mekabay.com/overviews/glossary.htm  & http://www.mekabay.com/overviews/glossary.pdf

Groups, Hate   http://www.mekabay.com/cyberwatch/03hate.htm

Guide, Logical Fallacies: A Beginner's            http://www.mekabay.com/overviews/logical_fallacies.htm  & http://www.mekabay.com/overviews/logical_fallacies.pdf

Guide, What's Important for Information Security: A Manager's            http://www.mekabay.com/infosecmgmt/mgrguidesec.htm  & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Guy from Canada is a Member of the NAACP, Why a White Jewish  http://www.mekabay.com/opinion/naacp.htm  & http://www.mekabay.com/opinion/naacp.pdf

Guy Marches in Gay Pride Parades, Why a Straight Married   http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Hackers are Enemies   http://www.mekabay.com/ethics/hackers_enemies.htm  & http://www.mekabay.com/ethics/hackers_enemies.pdf

Hackers, Why Kids Shouldn't Be Criminal      http://www.mekabay.com/ethics/kids_not_hack.htm  & http://www.mekabay.com/ethics/kids_not_hack.pdf

Hacking and Your Kids, Criminal       http://www.mekabay.com/cyberwatch/15hacking.htm

Hate Groups    http://www.mekabay.com/cyberwatch/03hate.htm

Hexad, Parkerian         http://www.mekabay.com/overviews/hexad.ppt  & http://www.mekabay.com/overviews/hexad.ppsx

High-Pressure Scam    http://www.mekabay.com/cyberwatch/16high-pressure_scam.htm

High-Pressure Scam    http://www.mekabay.com/opsmgmt/scam.htm  & http://www.mekabay.com/opsmgmt/scam.pdf

History of Computer Crime, Brief       http://www.mekabay.com/overviews/history.pdf

Hoaxes and Myths Online       http://www.mekabay.com/cyberwatch/06myths.htm

Hoaxes on the Internet, Stopping Chain Letters and   http://www.mekabay.com/infosecmgmt/stopchain.htm  & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Hoaxes, Virus  http://www.mekabay.com/cyberwatch/07virus_hoaxes.htm

Home From Boot Camp, A New Recruit Writes         http://www.mekabay.com/opinion/boot_camp.htm  & http://www.mekabay.com/opinion/boot_camp.pdf

Identification Cards and National Security, National            http://www.mekabay.com/opinion/id_cards_national_security.htm  & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Identification, Authentication and Authorization on the World Wide Web            http://www.mekabay.com/infosecmgmt/iaawww.pdf

If Not Now, When?, Implementing Computer Security:            http://www.mekabay.com/infosecmgmt/implementsec.htm  & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Implementation of Information Security Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm  & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Implementing Computer Security: If Not Now, When?            http://www.mekabay.com/infosecmgmt/implementsec.htm  & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Important for Information Security: A Manager's Guide, What's            http://www.mekabay.com/infosecmgmt/mgrguidesec.htm  & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Incident Response Team Management, Computer Security    http://www.mekabay.com/infosecmgmt/csirtm.htm  & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Industrial Espionage   http://www.mekabay.com/overviews/industrial_espionage.htm  & http://www.mekabay.com/overviews/industrial_espionage.pdf

Industry to Support Academic INFOSEC, Time for  http://www.mekabay.com/opinion/endowed_chairs.htm  & http://www.mekabay.com/opinion/endowed_chairs.pdf

Informatics Security, Medical  http://www.mekabay.com/overviews/medical.htm  & http://www.mekabay.com/overviews/medical.pdf

Information from the Web and the 'Net, Bad  http://www.mekabay.com/cyberwatch/05bad_info.htm

Information on Disk, Organizing and Safeguarding    http://www.mekabay.com/methodology/osiod.pdf  & http://www.mekabay.com/methodology/osiod.htm

Information Security Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm  & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Information Security Resources for Professional Development            http://www.mekabay.com/overviews/infosec_ed.pdf

Information Security, Careers in          http://www.mekabay.com/overviews/careers.htm  & http://www.mekabay.com/overviews/careers.pdf

Information Security, Net Present Value of    http://www.mekabay.com/infosecmgmt/npvsec.htm  & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Information Security: A Manager's Guide, What's Important for            http://www.mekabay.com/infosecmgmt/mgrguidesec.htm  & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Information Warfare -1995     http://www.mekabay.com/overviews/infowar_1995.htm & http://www.mekabay.com/overviews/infowar_1995.pdf

Information Warfare, Facilities Management in the Age of     http://www.mekabay.com/opsmgmt/facmgmt.htm  & http://www.mekabay.com/opsmgmt/facmgmt.pdf

INFOSEC, Personnel Management and         http://www.mekabay.com/infosecmgmt/personnel.htm  & http://www.mekabay.com/infosecmgmt/personnel.pdf

INFOSEC, Quality Assurance and Extortion http://www.mekabay.com/opinion/qa_extortion.htm  & http://www.mekabay.com/opinion/qa_extortion.pdf

INFOSEC, Time for Industry to Support Academic  http://www.mekabay.com/opinion/endowed_chairs.htm  & http://www.mekabay.com/opinion/endowed_chairs.pdf

INFOSEC: A Security Veteran in a Bad Mood Dumps on Everyone, A Rant About            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

INFOSEC: Psycho-Social Factors in the Implementation of Information Security Policy, Social Psychology and            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Infrastructure, A Primer on, Public Key          http://www.mekabay.com/overviews/pki.htm  & http://www.mekabay.com/overviews/pki.pdf

Insecurity Saga, VA Data        http://www.mekabay.com/infosecmgmt/vasaga.htm  & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Integrating Technology into our Moral Universe, Totem and Taboo in Cyberspace:            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Internet, Anarchy and the       http://www.mekabay.com/ethics/anarchy.htm  & http://www.mekabay.com/ethics/anarchy.pdf

Internet, Pedophiles on the     http://www.mekabay.com/cyberwatch/01pedophiles.htm

Internet, Securing Your Business in the Age of the     http://www.mekabay.com/infosecmgmt/securebusiness.htm  & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Internet, Stopping Chain Letters and Hoaxes on the   http://www.mekabay.com/infosecmgmt/stopchain.htm  & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Introduction to, Computer Crime,       http://www.mekabay.com/overviews/crime.htm  & http://www.mekabay.com/overviews/crime.pdf

Introduction, Enterprise Security Chapter 1 –            http://www.mekabay.com/overviews/ess_1.htm  & http://www.mekabay.com/overviews/ess_1.pdf

Introduction, Enterprise Security Chapter 1   http://www.mekabay.com/overviews/ess_1.htm  & http://www.mekabay.com/overviews/ess_1.pdf

Investigations Report, Verizon Data Breach   http://www.mekabay.com/overviews/verizon_2008.pdf

Jewish Guy from Canada is a Member of the NAACP, Why a White  http://www.mekabay.com/opinion/naacp.htm  & http://www.mekabay.com/opinion/naacp.pdf

Junk E-mail     http://www.mekabay.com/cyberwatch/10junk.htm

Key Infrastructure, A Primer on, Public          http://www.mekabay.com/overviews/pki.htm  & http://www.mekabay.com/overviews/pki.pdf

Kids Shouldn't Be Criminal Hackers, Why      http://www.mekabay.com/ethics/kids_not_hack.htm  & http://www.mekabay.com/ethics/kids_not_hack.pdf

Kids to Elders, Cyber-Safety for Everyone: from        http://www.mekabay.com/cyberwatch/cybersafety.pdf

Kids, Criminal Hacking and Your       http://www.mekabay.com/cyberwatch/15hacking.htm

Knowing, On Not       http://www.mekabay.com/opinion/not_knowing.htm  & http://www.mekabay.com/opinion/not_knowing.pdf

learning), SQ3R (method for organized study and       http://www.mekabay.com/methodology/sq3r.pdf  & http://www.mekabay.com/methodology/sq3r.htm

Letters and Hoaxes on the Internet, Stopping Chain   http://www.mekabay.com/infosecmgmt/stopchain.htm  & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Letters and Ponzi Schemes, Chain      http://www.mekabay.com/cyberwatch/11chain.htm

Life of Teaching, On a            http://www.mekabay.com/opinion/teaching.htm  & http://www.mekabay.com/opinion/teaching.pdf

Likely., Get Rich Quick? Not  http://www.mekabay.com/cyberwatch/12get_rich.htm

Logical Fallacies: A Beginner's Guide http://www.mekabay.com/overviews/logical_fallacies.htm  & http://www.mekabay.com/overviews/logical_fallacies.pdf

Making Ethical Decisions       http://www.mekabay.com/ethics/making_ethical_decisions.htm  & http://www.mekabay.com/ethics/making_ethical_decisions.pdf

Malicious Software      http://www.mekabay.com/cyberwatch/09malware.htm

Management and INFOSEC, Personnel         http://www.mekabay.com/infosecmgmt/personnel.htm  & http://www.mekabay.com/infosecmgmt/personnel.pdf

Management in the Age of Information Warfare, Facilities     http://www.mekabay.com/opsmgmt/facmgmt.htm  & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Management, Computer Security Incident Response Team    http://www.mekabay.com/infosecmgmt/csirtm.htm  & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Manager's Guide, What's Important for Information Security: A            http://www.mekabay.com/infosecmgmt/mgrguidesec.htm  & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Marches in Gay Pride Parades, Why a Straight Married Guy   http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Marriage Principles, Biblical    http://www.mekabay.com/opinion/biblical_behavior.htm & http://www.mekabay.com/opinion/biblical_behavior.pdf

Marriage, REALLY Traditional           http://www.mekabay.com/opinion/traditional_marriage.htm  & http://www.mekabay.com/opinion/traditional_marriage.pdf

Married Guy Marches in Gay Pride Parades, Why a Straight   http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Mastering a Master's Degree    http://www.mekabay.com/overviews/mastering.pdf

Master's Degree, Mastering a   http://www.mekabay.com/overviews/mastering.pdf

Medical Informatics Security   http://www.mekabay.com/overviews/medical.htm  & http://www.mekabay.com/overviews/medical.pdf

Member of the NAACP, Why a White Jewish Guy from Canada is a  http://www.mekabay.com/opinion/naacp.htm  & http://www.mekabay.com/opinion/naacp.pdf

method for organized study and learning, SQ3R         http://www.mekabay.com/methodology/sq3r.pdf  & http://www.mekabay.com/methodology/sq3r.htm

Mood Dumps on Everyone, A Rant About INFOSEC: A Security Veteran in a Bad            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

Moral Universe, Totem and Taboo in Cyberspace: Integrating Technology into our            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Morality, Bits of          http://www.mekabay.com/ethics/bits_morality.ppt  & http://www.mekabay.com/ethics/bits_morality.pdf

MS-Word 2003, Tracking Changes in  http://www.mekabay.com/methodology/track_changes.ppt

MS-WORD, Tips for Using     http://www.mekabay.com/methodology/word_tips.pdf

Music and Video, Don't Steal Software,          http://www.mekabay.com/cyberwatch/13theft.htm

Music or Videos, Seven Reasons Not to Steal Software,         http://www.mekabay.com/ethics/seven_reasons.htm  & http://www.mekabay.com/ethics/seven_reasons.pdf

Myths Online, Hoaxes and      http://www.mekabay.com/cyberwatch/06myths.htm

NAACP, Why a White Jewish Guy from Canada is a Member of the  http://www.mekabay.com/opinion/naacp.htm  & http://www.mekabay.com/opinion/naacp.pdf

Napster Cantata          http://www.mekabay.com/ethics/napster.htm  & http://www.mekabay.com/ethics/napster.pdf

National Identification Cards and National Security            http://www.mekabay.com/opinion/id_cards_national_security.htm  & http://www.mekabay.com/opinion/id_cards_national_security.pdf

National Security, National Identification Cards and            http://www.mekabay.com/opinion/id_cards_national_security.htm  & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Net Neutrality http://www.mekabay.com/opinion/net_neutrality.htm  & http://www.mekabay.com/opinion/net_neutrality.pdf

Net Present Value of Information Security     http://www.mekabay.com/infosecmgmt/npvsec.htm  & http://www.mekabay.com/infosecmgmt/npvsec.pdf

'Net, Bad Information from the Web and the  http://www.mekabay.com/cyberwatch/05bad_info.htm

Neutrality, Net            http://www.mekabay.com/opinion/net_neutrality.htm  & http://www.mekabay.com/opinion/net_neutrality.pdf

New Recruit Writes Home From Boot Camp, A         http://www.mekabay.com/opinion/boot_camp.htm  & http://www.mekabay.com/opinion/boot_camp.pdf

Non-Science: An Epistemological Conflict, Science and        http://www.mekabay.com/opinion/science.htm  & http://www.mekabay.com/opinion/science.pdf

Not Knowing, On       http://www.mekabay.com/opinion/not_knowing.htm  & http://www.mekabay.com/opinion/not_knowing.pdf

Not Likely., Get Rich Quick?  http://www.mekabay.com/cyberwatch/12get_rich.htm

Not Now, When?, Implementing Computer Security: If            http://www.mekabay.com/infosecmgmt/implementsec.htm  & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Not Speech, Viruses Are         http://www.mekabay.com/opinion/virus_not_speech.htm  & http://www.mekabay.com/opinion/virus_not_speech.pdf

Not to Steal Software, Music or Videos, Seven Reasons         http://www.mekabay.com/ethics/seven_reasons.htm  & http://www.mekabay.com/ethics/seven_reasons.pdf

Now, When?, Implementing Computer Security: If Not            http://www.mekabay.com/infosecmgmt/implementsec.htm  & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Office Automation, Computer Envy: Essays on         http://www.mekabay.com/opsmgmt/envy.htm  & http://www.mekabay.com/opsmgmt/envy.pdf

on a Budget, Security  http://www.mekabay.com/infosecmgmt/security_budget.pdf  & http://www.mekabay.com/infosecmgmt/security_budget.ppt & http://www.mekabay.com/infosecmgmt/security_budget.mp3

On a Life of Teaching http://www.mekabay.com/opinion/teaching.htm  & http://www.mekabay.com/opinion/teaching.pdf

on Disk, Organizing and Safeguarding Information    http://www.mekabay.com/methodology/osiod.pdf  & http://www.mekabay.com/methodology/osiod.htm

on Everyone, A Rant About INFOSEC: A Security Veteran in a Bad Mood Dumps            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

On Not Knowing        http://www.mekabay.com/opinion/not_knowing.htm  & http://www.mekabay.com/opinion/not_knowing.pdf

on Office Automation, Computer Envy: Essays         http://www.mekabay.com/opsmgmt/envy.htm  & http://www.mekabay.com/opsmgmt/envy.pdf

on the Internet, Pedophiles     http://www.mekabay.com/cyberwatch/01pedophiles.htm

on the Internet, Stopping Chain Letters and Hoaxes   http://www.mekabay.com/infosecmgmt/stopchain.htm  & http://www.mekabay.com/infosecmgmt/stopchain.pdf

on the World Wide Web, Identification, Authentication and Authorization            http://www.mekabay.com/infosecmgmt/iaawww.pdf

On Writing      http://www.mekabay.com/methodology/writing.pdf  & http://www.mekabay.com/methodology/writing.htm

on, Public Key Infrastructure, A Primer          http://www.mekabay.com/overviews/pki.htm  & http://www.mekabay.com/overviews/pki.pdf

Online Dating and Cybersex   http://www.mekabay.com/cyberwatch/02dating_cybersex.htm

Online, Hoaxes and Myths      http://www.mekabay.com/cyberwatch/06myths.htm

Online, Plagiarism       http://www.mekabay.com/cyberwatch/14plagiarism.htm

Online, Pornography   http://www.mekabay.com/cyberwatch/04porn.htm

Ops Security, Review of Visible          http://www.mekabay.com/opsmgmt/vos.pdf

organized study and learning), SQ3R (method for       http://www.mekabay.com/methodology/sq3r.pdf  & http://www.mekabay.com/methodology/sq3r.htm

Organizing and Safeguarding Information on Disk     http://www.mekabay.com/methodology/osiod.pdf  & http://www.mekabay.com/methodology/osiod.htm

Others, Threats to You and to            http://www.mekabay.com/cyberwatch/08threats.htm

our Moral Universe, Totem and Taboo in Cyberspace: Integrating Technology into            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Parades, Why a Straight Married Guy Marches in Gay Pride   http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Parkerian Hexad          http://www.mekabay.com/overviews/hexad.ppt  & http://www.mekabay.com/overviews/hexad.ppsx

Pedophiles on the Internet      http://www.mekabay.com/cyberwatch/01pedophiles.htm

Personnel Management and INFOSEC          http://www.mekabay.com/infosecmgmt/personnel.htm  & http://www.mekabay.com/infosecmgmt/personnel.pdf

PGP, Using      http://www.mekabay.com/overviews/using_pgp.ppt

Plagiarism Online        http://www.mekabay.com/cyberwatch/14plagiarism.htm

Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information Security            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Ponzi Schemes, Chain Letters and      http://www.mekabay.com/cyberwatch/11chain.htm

Pornography Online    http://www.mekabay.com/cyberwatch/04porn.htm

Present Value of Information Security, Net    http://www.mekabay.com/infosecmgmt/npvsec.htm  & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Pride Parades, Why a Straight Married Guy Marches in Gay   http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Primer on, Public Key Infrastructure, A          http://www.mekabay.com/overviews/pki.htm  & http://www.mekabay.com/overviews/pki.pdf

Principles, Biblical Marriage    http://www.mekabay.com/opinion/biblical_behavior.htm  & http://www.mekabay.com/opinion/biblical_behavior.pdf

Prisoner Abuse: The Blame Game      http://www.mekabay.com/opinion/prisoner_abuse.htm  & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Professional Development, Information Security Resources for            http://www.mekabay.com/overviews/infosec_ed.pdf

Programming for Security        http://www.mekabay.com/overviews/programming.htm  & http://www.mekabay.com/overviews/programming.pdf

Pseudonymity in Cyberspace, Anonymity and http://www.mekabay.com/overviews/anonpseudo.htm  & http://www.mekabay.com/overviews/anonpseudo.pdf

Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information Security Policy, Social            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm  & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Psycho-Social Factors in the Implementation of Information Security Policy, Social Psychology and INFOSEC:            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm  & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

PSYOP in Action        http://www.mekabay.com/opinion/psyop.htm  & http://www.mekabay.com/opinion/psyop.pdf

Public Key Infrastructure, A Primer on           http://www.mekabay.com/overviews/pki.htm  & http://www.mekabay.com/overviews/pki.pdf

Quality Assurance and Extortion, INFOSEC,            http://www.mekabay.com/opinion/qa_extortion.htm  & http://www.mekabay.com/opinion/qa_extortion.pdf

Quick? Not Likely., Get Rich  http://www.mekabay.com/cyberwatch/12get_rich.htm

Rant About INFOSEC: A Security Veteran in a Bad Mood Dumps on Everyone, A            http://www.mekabay.com/opinion/rant.htm & http://www.mekabay.com/opinion/rant.pdf

REALLY Traditional Marriage            http://www.mekabay.com/opinion/traditional_marriage.htm  & http://www.mekabay.com/opinion/traditional_marriage.pdf

Reasons Not to Steal Software, Music or Videos, Seven         http://www.mekabay.com/ethics/seven_reasons.htm  & http://www.mekabay.com/ethics/seven_reasons.pdf

Recruit Writes Home From Boot Camp, A New         http://www.mekabay.com/opinion/boot_camp.htm  & http://www.mekabay.com/opinion/boot_camp.pdf

Report, Verizon Data Breach Investigations   http://www.mekabay.com/overviews/verizon_2008.pdf

Resources for Professional Development, Information Security            http://www.mekabay.com/overviews/infosec_ed.pdf

Response Team Management, Computer Security Incident    http://www.mekabay.com/infosecmgmt/csirtm.htm  & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Review of Visible Ops Security           http://www.mekabay.com/opsmgmt/vos.pdf

Rich Quick? Not Likely., Get  http://www.mekabay.com/cyberwatch/12get_rich.htm

Safeguarding Information on Disk, Organizing and    http://www.mekabay.com/methodology/osiod.pdf  & http://www.mekabay.com/methodology/osiod.htm

Safely and Well, Using E-mail http://www.mekabay.com/infosecmgmt/emailsec.htm  & http://www.mekabay.com/infosecmgmt/emailsec.pdf

Safety, Airport http://www.mekabay.com/opinion/airport_safety.htm  & http://www.mekabay.com/opinion/airport_safety.pdf

Saga, VA Data Insecurity        http://www.mekabay.com/infosecmgmt/vasaga.htm  & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Scam, High-Pressure   http://www.mekabay.com/cyberwatch/16high-pressure_scam.htm

Scam, High-Pressure   http://www.mekabay.com/opsmgmt/scam.htm  & http://www.mekabay.com/opsmgmt/scam.pdf

Schemes, Chain Letters and Ponzi      http://www.mekabay.com/cyberwatch/11chain.htm

Science and Non-Science: An Epistemological Conflict         http://www.mekabay.com/opinion/science.htm  & http://www.mekabay.com/opinion/science.pdf

Securing Your Business in the Age of the Internet      http://www.mekabay.com/infosecmgmt/securebusiness.htm  & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Security Audit Checklist, Facilities     http://www.mekabay.com/infosecmgmt/facilities_checklist.pdf

Security Chapter 1 – Introduction, Enterprise            http://www.mekabay.com/overviews/ess_1.htm  & http://www.mekabay.com/overviews/ess_1.pdf

Security Incident Response Team Management, Computer    http://www.mekabay.com/infosecmgmt/csirtm.htm  & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Security on a Budget   http://www.mekabay.com/infosecmgmt/security_budget.pdf & http://www.mekabay.com/infosecmgmt/security_budget.ppt & http://www.mekabay.com/infosecmgmt/security_budget.mp3

Security on a Budget   http://www.mekabay.com/infosecmgmt/security_budget.pdf  & http://www.mekabay.com/infosecmgmt/security_budget.ppt  & http://www.mekabay.com/infosecmgmt/security_budget.mp3

Security Policy, Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm  & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Security Resources for Professional Development, Information            http://www.mekabay.com/overviews/infosec_ed.pdf

Security Veteran in a Bad Mood Dumps on Everyone, A Rant About INFOSEC: A            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

Security, Careers in Information          http://www.mekabay.com/overviews/careers.htm  & http://www.mekabay.com/overviews/careers.pdf

Security, Dreams of     http://www.mekabay.com/overviews/voting.htm  & http://www.mekabay.com/overviews/voting.pdf

Security, Facilities       http://www.mekabay.com/opsmgmt/facilities_security.htm  & http://www.mekabay.com/opsmgmt/facilities_security.pdf

Security, Medical Informatics  http://www.mekabay.com/overviews/medical.htm  & http://www.mekabay.com/overviews/medical.pdf

Security, National Identification Cards and National            http://www.mekabay.com/opinion/id_cards_national_security.htm  & http://www.mekabay.com/opinion/id_cards_national_security.pdf

Security, Net Present Value of Information    http://www.mekabay.com/infosecmgmt/npvsec.htm & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Security, Programming for       http://www.mekabay.com/overviews/programming.htm  & http://www.mekabay.com/overviews/programming.pdf

Security, Review of Visible Ops          http://www.mekabay.com/opsmgmt/vos.pdf

Security: A Manager's Guide, What's Important for Information            http://www.mekabay.com/infosecmgmt/mgrguidesec.htm  & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

Security: If Not Now, When?, Implementing Computer            http://www.mekabay.com/infosecmgmt/implementsec.htm  & http://www.mekabay.com/infosecmgmt/implementsec.pdf

Seven Reasons Not to Steal Software, Music or Videos          http://www.mekabay.com/ethics/seven_reasons.htm  & http://www.mekabay.com/ethics/seven_reasons.pdf

Shouldn't Be Criminal Hackers, Why Kids      http://www.mekabay.com/ethics/kids_not_hack.htm  & http://www.mekabay.com/ethics/kids_not_hack.pdf

Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information Security Policy            http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.htm  & http://www.mekabay.com/infosecmgmt/Soc_Psych_INFOSEC.pdf  & http://www.mekabay.com/infosecmgmt/soc_psych_INFOSEC.ppt

Software, Malicious     http://www.mekabay.com/cyberwatch/09malware.htm

Software, Music and Video, Don't Steal          http://www.mekabay.com/cyberwatch/13theft.htm

Software, Music or Videos, Seven Reasons Not to Steal         http://www.mekabay.com/ethics/seven_reasons.htm  & http://www.mekabay.com/ethics/seven_reasons.pdf

Speech, Viruses Are Not         http://www.mekabay.com/opinion/virus_not_speech.htm  & http://www.mekabay.com/opinion/virus_not_speech.pdf

SQ3R (method for organized study and learning)        http://www.mekabay.com/methodology/sq3r.pdf  & http://www.mekabay.com/methodology/sq3r.htm

Staffing the Data Center          http://www.mekabay.com/opsmgmt/staffing.htm  & http://www.mekabay.com/opsmgmt/staffing.pdf

Statistics v4, Understanding Computer Crime Studies and            http://www.mekabay.com/methodology/crime_stats_methods.pdf  & http://www.mekabay.com/methodology/crime_stats_methods.htm

Steal Software, Music and Video, Don't          http://www.mekabay.com/cyberwatch/13theft.htm

Steal Software, Music or Videos, Seven Reasons Not to         http://www.mekabay.com/ethics/seven_reasons.htm  & http://www.mekabay.com/ethics/seven_reasons.pdf

Stopping Chain Letters and Hoaxes on the Internet    http://www.mekabay.com/infosecmgmt/stopchain.htm  & http://www.mekabay.com/infosecmgmt/stopchain.pdf

Straight Married Guy Marches in Gay Pride Parades, Why a   http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Studies and Statistics v4, Understanding Computer Crime            http://www.mekabay.com/methodology/crime_stats_methods.pdf  & http://www.mekabay.com/methodology/crime_stats_methods.htm

study and learning), SQ3R (method for organized       http://www.mekabay.com/methodology/sq3r.pdf  & http://www.mekabay.com/methodology/sq3r.htm

superior, Velocihackers and Tyrannosaurus    http://www.mekabay.com/infosecmgmt/velocihackers.htm  & http://www.mekabay.com/infosecmgmt/velocihackers.pdf

Support Academic INFOSEC, Time for Industry to  http://www.mekabay.com/opinion/endowed_chairs.htm  & http://www.mekabay.com/opinion/endowed_chairs.pdf

Taboo in Cyberspace: Integrating Technology into our Moral Universe, Totem and            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Teaching, On a Life of            http://www.mekabay.com/opinion/teaching.htm  & http://www.mekabay.com/opinion/teaching.pdf

Team Management, Computer Security Incident Response    http://www.mekabay.com/infosecmgmt/csirtm.htm  & http://www.mekabay.com/infosecmgmt/csirtm.pdf

Technology into our Moral Universe, Totem and Taboo in Cyberspace: Integrating            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Terms, Glossary of Computer-Crime   http://www.mekabay.com/overviews/glossary.htm  & http://www.mekabay.com/overviews/glossary.pdf

the Age of Information Warfare, Facilities Management in     http://www.mekabay.com/opsmgmt/facmgmt.htm  & http://www.mekabay.com/opsmgmt/facmgmt.pdf

the Age of the Internet, Securing Your Business in     http://www.mekabay.com/infosecmgmt/securebusiness.htm  & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

The Blame Game, Prisoner Abuse:     http://www.mekabay.com/opinion/prisoner_abuse.htm & http://www.mekabay.com/opinion/prisoner_abuse.pdf

Thematic Analysis &, CATA: Computer-Aided          http://www.mekabay.com/methodology/cata_ppt.zip  & http://www.mekabay.com/methodology/cata.pps  & http://www.mekabay.com/methodology/cata_pps.zip

Thinking and Disintermediation, Critical        http://www.mekabay.com/opinion/critical_thinking.htm  & http://www.mekabay.com/opinion/critical_thinking.pdf

Threats to You and to Others http://www.mekabay.com/cyberwatch/08threats.htm

Time for Industry to Support Academic INFOSEC   http://www.mekabay.com/opinion/endowed_chairs.htm  & http://www.mekabay.com/opinion/endowed_chairs.pdf

Tips for Using MS-WORD      http://www.mekabay.com/methodology/word_tips.pdf

Totem and Taboo in Cyberspace: Integrating Technology into our Moral Universe            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Tracking Changes in MS-Word 2003   http://www.mekabay.com/methodology/track_changes.ppt

Traditional Marriage, REALLY           http://www.mekabay.com/opinion/traditional_marriage.htm  & http://www.mekabay.com/opinion/traditional_marriage.pdf

Tyrannosaurus superior, Velocihackers and    http://www.mekabay.com/infosecmgmt/velocihackers.htm  & http://www.mekabay.com/infosecmgmt/velocihackers.pdf

Understanding Computer Crime Studies and Statistics v4            http://www.mekabay.com/methodology/crime_stats_methods.pdf  & http://www.mekabay.com/methodology/crime_stats_methods.htm

Universe, Totem and Taboo in Cyberspace: Integrating Technology into our Moral            http://www.mekabay.com/ethics/totem_taboo_cyber.htm  & http://www.mekabay.com/ethics/totem_taboo_cyber.pdf

Use of Computers in, Crime,   http://www.mekabay.com/overviews/crime_use_of_computers_in.pdf

Using E-mail Safely and Well  http://www.mekabay.com/infosecmgmt/emailsec.htm  & http://www.mekabay.com/infosecmgmt/emailsec.pdf

Using MS-WORD, Tips for     http://www.mekabay.com/methodology/word_tips.pdf

Using PGP       http://www.mekabay.com/overviews/using_pgp.ppt

VA Data Insecurity Saga         http://www.mekabay.com/infosecmgmt/vasaga.htm  & http://www.mekabay.com/infosecmgmt/vasaga.pdf

Value of Information Security, Net Present    http://www.mekabay.com/infosecmgmt/npvsec.htm  & http://www.mekabay.com/infosecmgmt/npvsec.pdf

Velocihackers and Tyrannosaurus superior     http://www.mekabay.com/infosecmgmt/velocihackers.htm  & http://www.mekabay.com/infosecmgmt/velocihackers.pdf

Verizon Data Breach Investigations Report    http://www.mekabay.com/overviews/verizon_2008.pdf

Veteran in a Bad Mood Dumps on Everyone, A Rant About INFOSEC: A Security            http://www.mekabay.com/opinion/rant.htm  & http://www.mekabay.com/opinion/rant.pdf

Video, Don't Steal Software, Music and          http://www.mekabay.com/cyberwatch/13theft.htm

Videos, Seven Reasons Not to Steal Software, Music or         http://www.mekabay.com/ethics/seven_reasons.htm  & http://www.mekabay.com/ethics/seven_reasons.pdf

Virus Hoaxes   http://www.mekabay.com/cyberwatch/07virus_hoaxes.htm

Viruses Are Not Speech          http://www.mekabay.com/opinion/virus_not_speech.htm  & http://www.mekabay.com/opinion/virus_not_speech.pdf

Visible Ops Security, Review of          http://www.mekabay.com/opsmgmt/vos .pdf

Warfare -1995, Information    http://www.mekabay.com/overviews/infowar_1995.htm  & http://www.mekabay.com/overviews/infowar_1995.pdf

Warfare, Facilities Management in the Age of Information     http://www.mekabay.com/opsmgmt/facmgmt.htm  & http://www.mekabay.com/opsmgmt/facmgmt.pdf

Web and the 'Net, Bad Information from the  http://www.mekabay.com/cyberwatch/05bad_info.htm

Web, Identification, Authentication and Authorization on the World Wide            http://www.mekabay.com/infosecmgmt/iaawww.pdf

Well, Using E-mail Safely and http://www.mekabay.com/infosecmgmt/emailsec.htm  & http://www.mekabay.com/infosecmgmt/emailsec.pdf

What's Important for Information Security: A Manager's Guide            http://www.mekabay.com/infosecmgmt/mgrguidesec.htm  & http://www.mekabay.com/infosecmgmt/mgrguidesec.pdf

When?, Implementing Computer Security: If Not Now,            http://www.mekabay.com/infosecmgmt/implementsec.htm  & http://www.mekabay.com/infosecmgmt/implementsec.pdf

White Jewish Guy from Canada is a Member of the NAACP, Why a  http://www.mekabay.com/opinion/naacp.htm  & http://www.mekabay.com/opinion/naacp.pdf

Why a Straight Married Guy Marches in Gay Pride Parades    http://www.mekabay.com/opinion/gay_pride.htm  & http://www.mekabay.com/opinion/gay_pride.pdf

Why a White Jewish Guy from Canada is a Member of the NAACP   http://www.mekabay.com/opinion/naacp.htm  & http://www.mekabay.com/opinion/naacp.pdf

Why Kids Shouldn't Be Criminal Hackers       http://www.mekabay.com/ethics/kids_not_hack.htm  & http://www.mekabay.com/ethics/kids_not_hack.pdf

Wide Web, Identification, Authentication and Authorization on the World            http://www.mekabay.com/infosecmgmt/iaawww.pdf

World Wide Web, Identification, Authentication and Authorization on the            http://www.mekabay.com/infosecmgmt/iaawww.pdf

Writes Home From Boot Camp, A New Recruit         http://www.mekabay.com/opinion/boot_camp.htm  & http://www.mekabay.com/opinion/boot_camp.pdf

Writing, On     http://www.mekabay.com/methodology/writing.pdf  & http://www.mekabay.com/methodology/writing.htm

You and to Others, Threats to            http://www.mekabay.com/cyberwatch/08threats.htm

Your Business in the Age of the Internet, Securing     http://www.mekabay.com/infosecmgmt/securebusiness.htm  & http://www.mekabay.com/infosecmgmt/securebusiness.pdf

Your Kids, Criminal Hacking and       http://www.mekabay.com/cyberwatch/15hacking.htm