| 739 | -- | 740 | Eugene H. Spafford. Editorial |
| 741 | -- | 749 | Anmin Fu, Yuqing Zhang, ZhenChao Zhu, Qi Jing, Jingyu Feng. An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network |
| 750 | -- | 770 | Lara Khansa, Deborah F. Cook, Tabitha L. James, Olga Bruyaka. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms |
| 771 | -- | 781 | Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Pompeo Faruolo, Fabio Petagna, Umberto Ferraro Petrillo. Engineering a secure mobile messaging framework |
| 782 | -- | 790 | Stavros N. Shiaeles, Vasilios Katos, Alexandros S. Karakos, Basil K. Papadopoulos. Real time DDoS detection using fuzzy estimators |
| 791 | -- | 798 | WenBin Hsieh, Jenq-Shiou Leu. Exploiting hash functions to intensify the remote user authentication scheme |
| 799 | -- | 0 | Katina Michael. Hacking: The Next Generation |
| 800 | -- | 0 | Tim Wedge. The Basics of Digital Forensics |
| 801 | -- | 0 | Bill Tsoumas, Dimitris Gritzalis. Inside Cyber Warfare: Mapping the Cyber Underworld |
| 802 | -- | 803 | Alexios Mylonas, Dimitris Gritzalis. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software |