Journal: Computers & Security

Volume 16, Issue 7

570 -- 571. From the editor
572 -- 582Donn B. Parker. The strategic values of information security in business
583 -- 589Nigel Hickson. Encryption policy - A UK perspective
590 -- 594Chris Pounder. First steps towards a european union policy on the securing of electronic communications
595 -- 602Andy Jones. Penetration testing and system audit - experience gained during the investigation of systems within the UK
603 -- 609John Sherwood. Managing security for outsourcing contracts
610 -- 618Gerald L. Kovacich. Information systems security metrics management
629 -- 641Julie Bunnell, John Podd, Ron Henderson, Renee Napier, James Kennedy-Moffat. Cognitive, associative and conventional passwords: Recall and guessing rates