Journal: Computers & Security

Volume 21, Issue 5

382 -- 384E. Eugene Schultz. Taking a stand on hackers
385 -- 396E. Eugene Schultz. Security Views
397 -- 401Bill Hancock. Security crisis management the basics
402 -- 409Karin Höne, Jan H. P. Eloff. Information security policy what do international information security standards say?
410 -- 412Andy Nikishin. Much Ado About Nothing: Win32 Perrun
413 -- 420William J. Caelli. Trusted ...or... trustworthy: the search for a new paradigm for computer and network security
421 -- 423Brian McKenna. Enterprise in focus at NetSec 2002
424 -- 432Stephen Hinde. The perils of privacy
439 -- 448Yihua Liao, V. Rao Vemuri. Use of K-Nearest Neighbor classifier for intrusion detection
449 -- 460Der-Chyuan Lou, Jiang-Lung Liu. Steganographic Method for Secure Communications
461 -- 471Marit Hansen, Kristian Köhntopp, Andreas Pfitzmann. The Open Source approach opportunities and limitations with respect to security and privacy