| 10 | -- | 0 | Whitfield Diffie, Susan Landau. Communications Surveillance: Privacy and Security at Risk |
| 2 | -- | 0 | Mache Creeger. Cloud Computing: An Overview |
| 3 | -- | 0 | Charles Reis, Adam Barth, Carlos Pizano. Browser Security: Lessons from Google Chrome |
| 34 | -- | 35 | George V. Neville-Neil. Whither Sockets? |
| 77 | -- | 80 | Stan Kelly-Bootle. One Peut-Être, Two Peut-Être, Three Peut-Être, More |
| 1 | -- | 3 | Stan Kelly-Bootle. Some Rules and Restrictions May Apply |
| 20 | -- | 0 | Julian Hyde. Data in Flight |
| 30 | -- | 0 | Adam Leventhal. Triple-Parity RAID and Beyond |
| 40 | -- | 43 | George Neville-Neil. Standards Advice |