Journal: Computers & Security

Volume 22, Issue 4

270 -- 272E. Eugene Schultz. Why can t Microsoft stay out of the InfoSec headlines?
273 -- 283E. Eugene Schultz. Attackers hit Web hosting servers
284 -- 288Stephen Hinde. Careless about privacy
289 -- 291Hank Wolfe. Evidence analysis
292 -- 298Marcus K. Rogers. The role of criminal profiling in the computer forensics process
299 -- 307H. S. Venter, Jan H. P. Eloff. A taxonomy for information security technologies
308 -- 313James M. Anderson. Why we need a new definition of information security
316 -- 321Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Methods for preventing unauthorized software distribution
322 -- 336Neelam Bhalla. Is the mouse click mighty enough to bring society to its knees?