10 | -- | 0 | Whitfield Diffie, Susan Landau. Communications Surveillance: Privacy and Security at Risk |
2 | -- | 0 | Mache Creeger. Cloud Computing: An Overview |
3 | -- | 0 | Charles Reis, Adam Barth, Carlos Pizano. Browser Security: Lessons from Google Chrome |
34 | -- | 35 | George V. Neville-Neil. Whither Sockets? |
77 | -- | 80 | Stan Kelly-Bootle. One Peut-Être, Two Peut-Être, Three Peut-Être, More |
1 | -- | 3 | Stan Kelly-Bootle. Some Rules and Restrictions May Apply |
20 | -- | 0 | Julian Hyde. Data in Flight |
30 | -- | 0 | Adam Leventhal. Triple-Parity RAID and Beyond |
40 | -- | 43 | George Neville-Neil. Standards Advice |