Journal: Computers & Security

Volume 18, Issue 8

660 -- 669Stephen Hinde. Step into a secure new world - Compsec 99 report
671 -- 682Kevin Richards. Network based intrusion detection: A review of technologies
683 -- 692Michael Collins. Telecommunications crime - Part 2
693 -- 704Julie D. Nosworthy. Y2K contingency planning: Taking BCM into the 21:::st::: century
715 -- 726Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds. Computer crime and abuse: A survey of public attitudes and awareness
727 -- 733Wen-Her Yang, Shiuh-Pyng Shieh. Password authentication schemes with smart cards