| 5 | -- | 6 | Alan M. Davis. From The Editor: Between Scylla and Charybdis |
| 19 | -- | 21 | Carlo Pescio. Soapbox: When Past Solutions Cause Future Problems |
| 22 | -- | 25 | Erika Kindlund. Interface: Navigating The Applet-Browser Divide |
| 26 | -- | 0 | Robert Cochran. Insider: The Mousetrap Paradigm |
| 27 | -- | 32 | Charles P. Pfleeger, Deborah M. Cooper. Guest Editors Introduction: Security and Privacy: Promising Advances |
| 35 | -- | 42 | Andrew P. Kosoresow, Steven A. Hofmeyr. Intrusion Detection via System Call Traces |
| 43 | -- | 51 | Nicholas J. Puketza, Mandy Chung, Ronald A. Olsson, Biswanath Mukherjee. A Software Platform for Testing Intrusion Detection Systems |
| 52 | -- | 59 | Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao. A Flexible Security System for Using Internet Content |
| 60 | -- | 66 | James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford. Firewalls: An Expert Roundtable |
| 67 | -- | 74 | Joachim Karlsson, Kevin Ryan. A Cost-Value Approach for Prioritizing Requirements |
| 75 | -- | 81 | Michael Diaz, Joseph Sligo. How Software Process Improvement Helped Motorola |
| 83 | -- | 92 | Martin R. Stytz, Terry Adams, Brian Garcia, Steven M. Sheasby, Brian Zurita. Rapid Prototyping for Distributed Virtual Environments |
| 93 | -- | 100 | Bo Sanden. Modeling Concurrent Software |
| 101 | -- | 105 | Robert V. Binder. Quality Time: Can A Manufacturing Quality Model Work for Software? |
| 103 | -- | 105 | Christopher M. Lott. Manager: Breathing New Life Into The Waterfall Model |
| 119 | -- | 120 | Steve McConnell. Best Practices: Tool Support for Project Tracking |