Journal: Inf. Manag. Comput. Security

Volume 7, Issue 2

69 -- 75Steven Furnell, Paul Dowland, Peter W. Sanders. Dissecting the Hacker Manifesto
76 -- 82Rod Hart, Darren Morgan, Hai Tran. An introduction to automated intrusion detection approaches
83 -- 87Stephen Wilson. Digital signatures and the future of documentation
88 -- 98Eng Huat Ng. Step-by-step guideline for designing and documenting the navigation structure of multimedia hypertext systems
95 -- 100Carrie Liddy, Alice Sturgeon. The evolution of certificate model architecture