Journal: Computers & Security

Volume 17, Issue 2

96 -- 97Bill Hancock. From the Editor
99 -- 109Bill Hancock. Who do you call for, CISSP
110 -- 114Richard Ford. What a littledefinution can do
115 -- 118Stephen Hinde. Cyber Wars and other threats
124 -- 128Chris Pounder. Security and the new Data Protection law
129 -- 135Gerald L. Kovacich. Electronic-internet business and security
143 -- 150Sharman Lichtenstein. Internet risks for companies
171 -- 176Mohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani. On probabilities of hash value matches
177 -- 184Ed Dawson, Helen Gustafson. A Method for Measuring Entropy of Symmetric Cipher Key Generators