researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
19
, Issue
2
108
--
109
Bill Hancock
.
Alliance Formed to Fight Internet Attacks
108
--
108
Bill Hancock
.
Security Views
109
--
110
Bill Hancock
.
Code Paranoia about FBI Offerings to Detect DoS Infiltration
110
--
111
Bill Hancock
.
CIA says Russia and China are Building CyberSpy Organization
111
--
113
Bill Hancock
.
FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks
111
--
111
Bill Hancock
.
The SEC Hires CyberInvestigators to Search for Fraud
113
--
113
Bill Hancock
.
Industry Teaming on ISACs
113
--
114
Bill Hancock
.
In Wake of Attacks, FBI Using Racketeering Laws for Prosecution
114
--
115
Bill Hancock
.
Mafiaboy Hacker Eyed In Attacks
115
--
115
Bill Hancock
.
Japan Web Hackers Use Chinese and US Servers
116
--
116
Bill Hancock
.
Y2Hack Get-Together in Israel Under Political Attack
116
--
117
Bill Hancock
.
US Pentagon Defense Messaging System Shows Deficiencies in Security
117
--
117
Bill Hancock
.
Security Managers Cite Need for Real-Time Security
119
--
127
Stephen Hinde
.
New Millennium, Old Failures
128
--
132
Steve Webb
.
Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age
133
--
140
Gerald L. Kovacich
,
William C. Boni
.
Internet Targets
141
--
148
Michael Collins
.
Telecommunications Crime - Part 3
149
--
163
Mark Hoogenboom
,
Patrick Steemers
.
Security For Remote Access And Mobile Application
185
--
194
Lynette Barnard
,
Rossouw von Solms
.
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control