5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 18 | Gary F. Templeton. Video image stabilization and registration technology |
19 | -- | 24 | Siri Birgitte Uldal, Muhammad Aimal Marjan. Computing in post-war Afghanistan |
25 | -- | 30 | Pamela Samuelson. Regulating technical design |
31 | -- | 34 | Michael A. Cusumano. Where does Russia fit into the global software industry? |
35 | -- | 37 | Nanda Kumar, Abbe Mowshowitz. Who should govern the internet? |
39 | -- | 40 | Diane Crawford. Top 10 downloads from ACM s digital library |
41 | -- | 42 | David A. Patterson. Offshoring: finally facts vs. folklore |
44 | -- | 47 | Brajendra Panda, Joseph Giordano, Daniel Kalil. Introduction |
48 | -- | 55 | Eoghan Casey. Investigating sophisticated security breaches |
56 | -- | 61 | Brian D. Carrier. Risks of live digital forensic analysis |
63 | -- | 66 | Frank Adelstein. Live forensics: diagnosing your system without killing it first |
67 | -- | 68 | . The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage |
69 | -- | 70 | Chet Hosmer. Digital evidence bag |
71 | -- | 75 | Sheldon Teelink, Robert F. Erbacher. Improving the computer forensic analysis process through visualization |
76 | -- | 80 | Golden G. Richard III, Vassil Roussev. Next-generation digital forensics |
81 | -- | 83 | Rahul Bhaskar. State and local law enforcement is not ready for a cyber Katrina |
85 | -- | 87 | Simson L. Garfinkel. AFF: a new format for storing hard drive images |
88 | -- | 94 | Ganesan Shankaranarayanan, Adir Even. The metadata enigma |
96 | -- | 103 | Pak-Lok Poon, Amy H. L. Lau. The present B2C implementation framework |
104 | -- | 109 | Jan Damsgaard, Mihir A. Parikh, Bharat Rao. Wireless commons perils in the common good |
110 | -- | 0 | . Student de-charter notice |
111 | -- | 116 | Henry M. Gladney. Principles for digital preservation |
117 | -- | 122 | Stephen Owen, Pearl Brereton, David Budgen. Protocol analysis: a neglected practice |
123 | -- | 128 | Deborah J. Armstrong. The quarks of object-oriented development |
129 | -- | 134 | Roli Varma. Making computer science minority-friendly |
152 | -- | 0 | Peter G. Neumann. Trustworthy systems revisited |