Journal: Communications of the ACM

Volume 42, Issue 7

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 18Meg McGinity. Telecom Act, Scene One
19 -- 22Neil Munro. Inforwar: AK-47s, Lies, and Videotape
23 -- 26Scott R. Tilley. The Need for Speed
27 -- 29John Gallaugher. Challenging to New Conventional Wisdom of Net Commerce Strategies
30 -- 32Brajendra Panda, Joseph Giordano. Defensive Information Warfare - Introduction
33 -- 37Shiu-Kai Chin. High-Confidence Design for Security: Don t Trust - Verify
38 -- 44Anup K. Ghosh, Jeffrey M. Voas. Inoculating Software for Survivability
46 -- 52Terrance Goan. A Cop on the Beat Collecting and Appraising Intrusion Evidence
53 -- 61Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo. Testing and Evaluating: Computer Intrusion Detection Systems
62 -- 69Matthew Stillerman, Carla Marceau, Maureen Stillman. Intrusion Detection for Distributed Applications
71 -- 75Sushil Jajodia, Catherine D. McCollum, Paul Ammann. Trusted Recovery
76 -- 82Jim Waldo. The Jini Architecture for Network-Centric Computing
83 -- 87David W. Plummer, Larry J. Dalton, Frank Peter. The Recodable Locking Device
88 -- 95Janice C. Sipior, Burke T. Ward. The Dark Side of Employee Email
96 -- 104Ned Kock. A Case of Academic Plagiarism
120 -- 0Peter G. Neumann. Information is a Double-Edged Sword