This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
Journal Article Resources

 

The Python Programming Language

By Constantinos Doskas

• Code samples: A_April2019.zip | May2019.zip | August2019.zip | September2019.zip | October2019.zip | November2019.zip

• Installation Notes: Linux \ Windows

 

 

ISSA Journal October 2018

Extracting Timely Sign-in Data from Office 365 Logs

By Mark J. Lucas

Office 365 Appendix

 

ISSA Journal April 2017

Security Assurance of Docker Containers: Part 1

By Stefan Winkel

Appendix A

Appendix B

 

Donn' Corner Collection of Security Maxims

By Donn Parker - ISSA Distinguished Fellow, Silicon Valley, USA Chapter

Donn's Maxims

 

Howard A. Schmidt Memorial Tribute

Community Search
Sign In


Calendar

1/22/2020
ISSA Thought Leadership Series: The Asset Management Resurgence

2/22/2020 » 2/23/2020
February 2020 ISSA Cyber Executive Forum San Francisco, CA




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information