Journal: Information Systems Security

Volume 6, Issue 2

3 -- 5Ralph Spencer Poore. Invisible Connections
6 -- 11Michael I. Sobol. Network Auditing Products
12 -- 27Bob Barnhart. An Object-Oriented Software Framework for Developing Trusted Intermediaries
28 -- 44Donald R. Richards. Biometric Identification
45 -- 55Gerald L. Kovacich. Information Warfare and the Information Systems Security Professional
56 -- 80Thomas Welch. Computer Crime Investigation and Computer Forensics