Journal: Computers & Security

Volume 19, Issue 3

202 -- 203Bill Hancock. Security Views
203 -- 204Bill Hancock. Network Warfare On The Rise
204 -- 205Bill Hancock. FBI Source Convicted of Hackin
205 -- 206Bill Hancock. Microsoft Whistler Release Posted to Internet
206 -- 207Bill Hancock. US Senate Passes Bill to Tighten Up Government Network
207 -- 207Bill Hancock. Cyberpatrol Reverse Engineering: Round 2
208 -- 208Bill Hancock. US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems
208 -- 208Bill Hancock. First Cybercrime Task Force City - Pittsburgh
209 -- 211Bill Hancock. More on the January, 2000, NSA Computer Problems
211 -- 212Bill Hancock. Another Insider Job on Wall Stree
211 -- 211Bill Hancock. Mexico s President Under Cyberattack - Again
212 -- 213Bill Hancock. USDOJ Goes Prime Time With Cybercrime Web Sit
212 -- 212Bill Hancock. FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers
213 -- 214Bill Hancock. EU and US Reach Agreement on Privacy Issues
214 -- 215Bill Hancock. Warning from the US Government: Companies Get Secure or..
215 -- 215Bill Hancock. China Relaxes Encryption Rules
216 -- 216Bill Hancock. French Card Forgery Note Could Work
216 -- 217Bill Hancock. US Law Enforcement Needs You!
217 -- 218Bill Hancock. UK Law Enforcement Bemoans Criminal Activities on Interne
218 -- 219Bill Hancock. Kevin Mitnick Gets His Day in Congres
218 -- 218Bill Hancock. Intel Creates New Plans for Notebook Security
219 -- 220Bill Hancock. Web Site Owners Seek Security People Apply Now!
220 -- 221Bill Hancock. Generation X Hackers?
222 -- 229Stephen Hinde. Life Was Simple Then
230 -- 233Richard Barber. Implementing Public Key Infrastructures in a Dynamic Business Environment
234 -- 242Thomas Finne. Information Systems Risk Management: Key Concepts and Business Processes
243 -- 256Mariki M. Eloff, Sebastiaan H. von Solms. Information Security Management: A Hierarchical Framework for Various Approaches
267 -- 281Spyros Kokolakis, Evangelos A. Kiountouzis. Achieving Interoperability in a Multiple-Security- Policies Environment
282 -- 288Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Generation of RSA Keys That Are Guaranteed to be Unique for Each User