Journal: Computers & Security

Volume 19, Issue 5

382 -- 383Bill Hancock. Security Views
383 -- 384Bill Hancock. I Agree Legal Agreements Get Legislated
385 -- 387Bill Hancock. The US Government Tells Its Users to Clean Up Their E-mail
387 -- 388Bill Hancock. Home PC s Targeted by Hackers (Duh!)
388 -- 388Bill Hancock. CIO s Get Serious About Best Security Practices
389 -- 391Bill Hancock. Microsoft a Popular Virus Target Due to Ubiquity
389 -- 389Bill Hancock. Yahoo Faces Identity Crisis
391 -- 392Bill Hancock. UK s RIP Bill Creates Official Snooping
392 -- 393Bill Hancock. Extortion Going Online
393 -- 393Bill Hancock. Office 2000 Patch Recommended by CERT
393 -- 394Bill Hancock. Self-Regulation for Privacy Doesn t Work Says FTC
394 -- 395Bill Hancock. ...But the Industry Wants Self-Regulation
395 -- 396Bill Hancock. US Senate Wakes Up to Need for Cybertools for Law Enforcers
396 -- 397Bill Hancock. PGP V5.0 Keys Potentially Insecure
397 -- 398Bill Hancock. Canadian Credit Card Conundrum Caused by a Cracker
398 -- 400Bill Hancock. Network Solutions Re-evaluates Security
398 -- 398Bill Hancock. Suspect Charged in Love Bug Worm has Charges Dropped
400 -- 401Bill Hancock. CMU Sets Up a Sister to CERT
401 -- 401Bill Hancock. Speedy Response Yields Success at DOE
402 -- 403Bill Hancock. Who s to Blame?
402 -- 402Bill Hancock. AOL Gets Busted - Again
403 -- 403Bill Hancock. Wireless Ubiquity for E-Biz
404 -- 404Bill Hancock. And Now, the Bug-in-Your-Site Award Goes To...
404 -- 405Bill Hancock. Isn t It Interesting What You Can Buy At An Auction Site? TV s, Computers, Drugs
405 -- 407Bill Hancock. G8 Thinks About Cybercrime (It s About Time, Too)
408 -- 420Stephen Hinde. Love Conquers All?
421 -- 427Gerald L. Kovacich. Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon
428 -- 441Stephen M. Matyas, Jeff Stapleto. A Biometric Standard for Information Management and Security
453 -- 465Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho. A Generic Electronic Payment Model Supporting Multiple Merchant Transactions
466 -- 469Mohammad Peyravian, Nevenko Zunic. Methods for Protecting Password Transmission