Journal: Computers & Security

Volume 17, Issue 8

652 -- 653Bill Hancock. From the editor
654 -- 666Bill Hancock. Security views
667 -- 670August Bequai. Employee abuses in cyberspace: Management s legal quagmire
671 -- 681Stephen Hinde. Time, history and war: A personal voyage through Compsec 98
683 -- 692H. S. Venter, Jan H. P. Eloff. Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools
725 -- 732Leong Peng Chor, Hsu Wen Jing, Tan Peng Chong. A geometric approach for shared secrets, a refinement