| 88 | -- | 89 | Bill Hancock. From the editor |
| 105 | -- | 108 | Richard Ford. Malware: Troy revisited |
| 109 | -- | 112 | August Bequai. Monitoring employee communications in cyberspace: The pitfalls facing management |
| 113 | -- | 119 | Stephen Hinde. Year 2000 update |
| 120 | -- | 123 | Sarah Gordon. Telephone tales |
| 134 | -- | 147 | Mohammad Peyravian, Don Coppersmith. A structured symmetric-key block cipher |
| 165 | -- | 177 | Brendon Harris, Ray Hunt. Fairwall certification |