Journal: Computers & Security

Volume 19, Issue 2

108 -- 109Bill Hancock. Alliance Formed to Fight Internet Attacks
108 -- 108Bill Hancock. Security Views
109 -- 110Bill Hancock. Code Paranoia about FBI Offerings to Detect DoS Infiltration
110 -- 111Bill Hancock. CIA says Russia and China are Building CyberSpy Organization
111 -- 113Bill Hancock. FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks
111 -- 111Bill Hancock. The SEC Hires CyberInvestigators to Search for Fraud
113 -- 113Bill Hancock. Industry Teaming on ISACs
113 -- 114Bill Hancock. In Wake of Attacks, FBI Using Racketeering Laws for Prosecution
114 -- 115Bill Hancock. Mafiaboy Hacker Eyed In Attacks
115 -- 115Bill Hancock. Japan Web Hackers Use Chinese and US Servers
116 -- 116Bill Hancock. Y2Hack Get-Together in Israel Under Political Attack
116 -- 117Bill Hancock. US Pentagon Defense Messaging System Shows Deficiencies in Security
117 -- 117Bill Hancock. Security Managers Cite Need for Real-Time Security
119 -- 127Stephen Hinde. New Millennium, Old Failures
128 -- 132Steve Webb. Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age
133 -- 140Gerald L. Kovacich, William C. Boni. Internet Targets
141 -- 148Michael Collins. Telecommunications Crime - Part 3
149 -- 163Mark Hoogenboom, Patrick Steemers. Security For Remote Access And Mobile Application
185 -- 194Lynette Barnard, Rossouw von Solms. A Formalized Approach to the Effective Selection and Evaluation of Information Security Control