5 | -- | 0 | Diane Crawford. Editorial Pointers |
9 | -- | 10 | Robert Fox. News Track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 18 | Meg McGinity. Telecom Act, Scene One |
19 | -- | 22 | Neil Munro. Inforwar: AK-47s, Lies, and Videotape |
23 | -- | 26 | Scott R. Tilley. The Need for Speed |
27 | -- | 29 | John Gallaugher. Challenging to New Conventional Wisdom of Net Commerce Strategies |
30 | -- | 32 | Brajendra Panda, Joseph Giordano. Defensive Information Warfare - Introduction |
33 | -- | 37 | Shiu-Kai Chin. High-Confidence Design for Security: Don t Trust - Verify |
38 | -- | 44 | Anup K. Ghosh, Jeffrey M. Voas. Inoculating Software for Survivability |
46 | -- | 52 | Terrance Goan. A Cop on the Beat Collecting and Appraising Intrusion Evidence |
53 | -- | 61 | Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo. Testing and Evaluating: Computer Intrusion Detection Systems |
62 | -- | 69 | Matthew Stillerman, Carla Marceau, Maureen Stillman. Intrusion Detection for Distributed Applications |
71 | -- | 75 | Sushil Jajodia, Catherine D. McCollum, Paul Ammann. Trusted Recovery |
76 | -- | 82 | Jim Waldo. The Jini Architecture for Network-Centric Computing |
83 | -- | 87 | David W. Plummer, Larry J. Dalton, Frank Peter. The Recodable Locking Device |
88 | -- | 95 | Janice C. Sipior, Burke T. Ward. The Dark Side of Employee Email |
96 | -- | 104 | Ned Kock. A Case of Academic Plagiarism |
120 | -- | 0 | Peter G. Neumann. Information is a Double-Edged Sword |