Journal: Computers & Security

Volume 19, Issue 6

476 -- 477Bill Hancock. A Need for a Network Security Czar
477 -- 477Bill Hancock. US Government Fighting for Expanded Wiretap Laws
477 -- 479Bill Hancock. E-Commerce Paranoia: Flaws in Code
479 -- 480Bill Hancock. Truly Certified: Security Certifications Updat
480 -- 487Bill Hancock. Digital Certificates Get Creative
482 -- 482Bill Hancock. Health Care Security: A Hard Look at a Growing Problem
483 -- 483Bill Hancock. Safeway UK s Website Shut Down
483 -- 483Bill Hancock. Philippine Government Creates Incident Response Team
483 -- 485Bill Hancock. DDoS Defence Gets Regulatory
485 -- 486Bill Hancock. Visa s Ten Commandments for E-Security Online
486 -- 487Bill Hancock. Porngate ?
487 -- 487Bill Hancock. What You Sell Online in France Could Be Restricted...
488 -- 488Bill Hancock. Hackers Still Love to Attack the Pentago
488 -- 491Bill Hancock. Spying At Home: A New Pastime to Detect Online Romanc
491 -- 493Bill Hancock. Is a Convicted Hacker Really Reformed and Should You Hire Them?
493 -- 494Bill Hancock. DefCon Recruiting JamFest
494 -- 495Bill Hancock. Hacker Target: Mobile Phones
495 -- 496Bill Hancock. GeoCities Ordered to Report on Information Poste
495 -- 495Bill Hancock. E-Mail Privacy Issues Escalate
496 -- 497Bill Hancock. Hackers Breach Firewall
497 -- 498Bill Hancock. Lotus Domino Holes Up
499 -- 504Stephen Hinde. Fireworks, Beer and Old Halfpennies - The Risks of Assumption
505 -- 519Gerald L. Kovacich. Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why
520 -- 528Fred Cohen. A Mathematical Structure of Simple Defensive Network Deception
529 -- 539Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds. Authentication and Supervision: A Survey of User Attitudes
551 -- 558Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Ticket and Challenge-Based Protocols for Timestamping
559 -- 563Andres Torrubia, Francisco J. Mora. Information Security in Multiprocessor Systems Based on the X86 Architecture