researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
19
, Issue
3
202
--
203
Bill Hancock
.
Security Views
203
--
204
Bill Hancock
.
Network Warfare On The Rise
204
--
205
Bill Hancock
.
FBI Source Convicted of Hackin
205
--
206
Bill Hancock
.
Microsoft Whistler Release Posted to Internet
206
--
207
Bill Hancock
.
US Senate Passes Bill to Tighten Up Government Network
207
--
207
Bill Hancock
.
Cyberpatrol Reverse Engineering: Round 2
208
--
208
Bill Hancock
.
US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems
208
--
208
Bill Hancock
.
First Cybercrime Task Force City - Pittsburgh
209
--
211
Bill Hancock
.
More on the January, 2000, NSA Computer Problems
211
--
212
Bill Hancock
.
Another Insider Job on Wall Stree
211
--
211
Bill Hancock
.
Mexico s President Under Cyberattack - Again
212
--
213
Bill Hancock
.
USDOJ Goes Prime Time With Cybercrime Web Sit
212
--
212
Bill Hancock
.
FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers
213
--
214
Bill Hancock
.
EU and US Reach Agreement on Privacy Issues
214
--
215
Bill Hancock
.
Warning from the US Government: Companies Get Secure or..
215
--
215
Bill Hancock
.
China Relaxes Encryption Rules
216
--
216
Bill Hancock
.
French Card Forgery Note Could Work
216
--
217
Bill Hancock
.
US Law Enforcement Needs You!
217
--
218
Bill Hancock
.
UK Law Enforcement Bemoans Criminal Activities on Interne
218
--
219
Bill Hancock
.
Kevin Mitnick Gets His Day in Congres
218
--
218
Bill Hancock
.
Intel Creates New Plans for Notebook Security
219
--
220
Bill Hancock
.
Web Site Owners Seek Security People Apply Now!
220
--
221
Bill Hancock
.
Generation X Hackers?
222
--
229
Stephen Hinde
.
Life Was Simple Then
230
--
233
Richard Barber
.
Implementing Public Key Infrastructures in a Dynamic Business Environment
234
--
242
Thomas Finne
.
Information Systems Risk Management: Key Concepts and Business Processes
243
--
256
Mariki M. Eloff
,
Sebastiaan H. von Solms
.
Information Security Management: A Hierarchical Framework for Various Approaches
267
--
281
Spyros Kokolakis
,
Evangelos A. Kiountouzis
.
Achieving Interoperability in a Multiple-Security- Policies Environment
282
--
288
Mohammad Peyravian
,
Stephen M. Matyas
,
Allen Roginsky
,
Nevenko Zunic
.
Generation of RSA Keys That Are Guaranteed to be Unique for Each User