| 190 | -- | 191 | Bill Hancock. From the editor |
| 192 | -- | 200 | Bill Hancock. Security Views |
| 201 | -- | 206 | Nicky Maddison. Y2000 enters the body politic |
| 207 | -- | 210 | Stephen Hinde. Recent security surveys |
| 211 | -- | 221 | Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler. A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID |
| 233 | -- | 252 | Gert van der Merwe, Jan H. P. Eloff. Software source code, visual risk analysis: an example |
| 253 | -- | 264 | Tom Coffey, T. Newe. Realisation of a minimum-knowledge identification and signature scheme |
| 265 | -- | 272 | Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Reversible data mixing procedure for efficient public-key encryption |