| 2002 |
| 185 | | Bill Hancock:
Security crisis management the basics.
Computers & Security 21(5): 397-401 (2002) |
| 2001 |
| 184 | | Bill Hancock:
The Chief Security Officer's Top Ten List for 2001.
Computers & Security 20(1): 10-14 (2001) |
| 183 | | Bill Hancock:
`Safe Harbor' Provision Adopters Few and Far Between.
Computers & Security 20(1): 14-15 (2001) |
| 182 | | Bill Hancock:
The Wireless Great Divide But Getting Smaller.
Computers & Security 20(1): 15-17 (2001) |
| 181 | | Bill Hancock:
It's a Privacy Thing in 2001.
Computers & Security 20(1): 17-18 (2001) |
| 180 | | Bill Hancock:
Fighting SPAM in Europe.
Computers & Security 20(1): 18-19 (2001) |
| 179 | | Bill Hancock:
Privacy Advocates Grow in Europe.
Computers & Security 20(1): 19-20 (2001) |
| 178 | | Bill Hancock:
Y2K & Security A Low Priority Year.
Computers & Security 20(1): 4-5 (2001) |
| 177 | | Bill Hancock:
Voodoo is Alive and Well on Your Computer.
Computers & Security 20(1): 5-6 (2001) |
| 176 | | Bill Hancock:
Hand-held Virii On The Way.
Computers & Security 20(1): 6-7 (2001) |
| 175 | | Bill Hancock:
China Passes Law to Promote Internet Security Supposedly.
Computers & Security 20(1): 7-7 (2001) |
| 174 | | Bill Hancock:
Smarter Marines.
Computers & Security 20(1): 7-7 (2001) |
| 173 | | Bill Hancock:
E-tailers Batten Down the Hatches.
Computers & Security 20(1): 8-8 (2001) |
| 172 | | Bill Hancock:
Information Warfare Highlighted as a Concern by US Government.
Computers & Security 20(1): 8-9 (2001) |
| 171 | | Bill Hancock:
E-mail Spammers Jailed.
Computers & Security 20(1): 9-10 (2001) |
| 170 | | Bill Hancock:
A Practical Risk.
Computers & Security 20(2): 98-126 (2001) |
| 169 | | Bill Hancock:
Security Views.
Computers & Security 20(3): 188-201 (2001) |
| 168 | | Bill Hancock:
Security Views.
Computers & Security 20(4): 278-294 (2001) |
| 167 | | Bill Hancock:
Security Views.
Computers & Security 20(5): 348-363 (2001) |
| 166 | | Bill Hancock:
U.S. DoD Puts Up Blocks to Code Red.
Computers & Security 20(6): 451-467 (2001) |
| 165 | | Bill Hancock:
Security View.
Computers & Security 20(7): 546-560 (2001) |
| 164 | | Bill Hancock:
Security Views.
Computers & Security 20(8): 643-656 (2001) |
| 2000 |
| 163 | | Bill Hancock:
Down Under, Hacking Private Computers by the Government is Legal.
Computers & Security 19(1): 10-12 (2000) |
| 162 | | Bill Hancock:
New York Times Fires Employees for Violating Internal E-mail Policies.
Computers & Security 19(1): 12-12 (2000) |
| 161 | | Bill Hancock:
The "S" in SAP Doesn't Stand for Security.
Computers & Security 19(1): 12-13 (2000) |
| 160 | | Bill Hancock:
Melissa Virus Creator Pleads Guilty.
Computers & Security 19(1): 13-13 (2000) |
| 159 | | Bill Hancock:
`Anonymizing' Software Causes Law Enforcement Concerns.
Computers & Security 19(1): 13-14 (2000) |
| 158 | | Bill Hancock:
Security Problems Go Mobile In Your Next Car.
Computers & Security 19(1): 14-16 (2000) |
| 157 | | Bill Hancock:
The L0pht Goes Corporate and becomes @Stake.
Computers & Security 19(1): 16-17 (2000) |
| 156 | | Bill Hancock:
Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild.
Computers & Security 19(1): 6-7 (2000) |
| 155 | | Bill Hancock:
Cell Phone Crypto Cracked.
Computers & Security 19(1): 7-8 (2000) |
| 154 | | Bill Hancock:
Clinton's Proposed Crypto Regulations Under Attack.
Computers & Security 19(1): 8-9 (2000) |
| 153 | | Bill Hancock:
Overhauling the National Security Agency?
Computers & Security 19(1): 9-10 (2000) |
| 152 | | Bill Hancock:
Security Views.
Computers & Security 19(2): 108-108 (2000) |
| 151 | | Bill Hancock:
Alliance Formed to Fight Internet Attacks.
Computers & Security 19(2): 108-109 (2000) |
| 150 | | Bill Hancock:
Code Paranoia about FBI Offerings to Detect DoS Infiltration.
Computers & Security 19(2): 109-110 (2000) |
| 149 | | Bill Hancock:
CIA says Russia and China are Building CyberSpy Organization.
Computers & Security 19(2): 110-111 (2000) |
| 148 | | Bill Hancock:
The SEC Hires CyberInvestigators to Search for Fraud.
Computers & Security 19(2): 111-111 (2000) |
| 147 | | Bill Hancock:
FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks.
Computers & Security 19(2): 111-113 (2000) |
| 146 | | Bill Hancock:
Industry Teaming on ISACs.
Computers & Security 19(2): 113-113 (2000) |
| 145 | | Bill Hancock:
In Wake of Attacks, FBI Using Racketeering Laws for Prosecution.
Computers & Security 19(2): 113-114 (2000) |
| 144 | | Bill Hancock:
Mafiaboy Hacker Eyed In Attacks.
Computers & Security 19(2): 114-115 (2000) |
| 143 | | Bill Hancock:
Japan Web Hackers Use Chinese and US Servers.
Computers & Security 19(2): 115-115 (2000) |
| 142 | | Bill Hancock:
Y2Hack Get-Together in Israel Under Political Attack.
Computers & Security 19(2): 116-116 (2000) |
| 141 | | Bill Hancock:
US Pentagon Defense Messaging System Shows Deficiencies in Security.
Computers & Security 19(2): 116-117 (2000) |
| 140 | | Bill Hancock:
Security Managers Cite Need for Real-Time Security.
Computers & Security 19(2): 117-117 (2000) |
| 139 | | Bill Hancock:
Security Views.
Computers & Security 19(3): 202-203 (2000) |
| 138 | | Bill Hancock:
Network Warfare On The Rise.
Computers & Security 19(3): 203-204 (2000) |
| 137 | | Bill Hancock:
FBI Source Convicted of Hackin.
Computers & Security 19(3): 204-205 (2000) |
| 136 | | Bill Hancock:
Microsoft "Whistler" Release Posted to Internet.
Computers & Security 19(3): 205-206 (2000) |
| 135 | | Bill Hancock:
US Senate Passes Bill to Tighten Up Government Network.
Computers & Security 19(3): 206-207 (2000) |
| 134 | | Bill Hancock:
Cyberpatrol Reverse Engineering: Round 2.
Computers & Security 19(3): 207-207 (2000) |
| 133 | | Bill Hancock:
First Cybercrime Task Force City - Pittsburgh.
Computers & Security 19(3): 208-208 (2000) |
| 132 | | Bill Hancock:
US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems.
Computers & Security 19(3): 208-208 (2000) |
| 131 | | Bill Hancock:
More on the January, 2000, NSA Computer Problems.
Computers & Security 19(3): 209-211 (2000) |
| 130 | | Bill Hancock:
Mexico's President Under Cyberattack - Again.
Computers & Security 19(3): 211-211 (2000) |
| 129 | | Bill Hancock:
Another Insider Job on Wall Stree.
Computers & Security 19(3): 211-212 (2000) |
| 128 | | Bill Hancock:
FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers.
Computers & Security 19(3): 212-212 (2000) |
| 127 | | Bill Hancock:
USDOJ Goes Prime Time With Cybercrime Web Sit.
Computers & Security 19(3): 212-213 (2000) |
| 126 | | Bill Hancock:
EU and US Reach Agreement on Privacy Issues.
Computers & Security 19(3): 213-214 (2000) |
| 125 | | Bill Hancock:
Warning from the US Government: Companies Get Secure or...
Computers & Security 19(3): 214-215 (2000) |
| 124 | | Bill Hancock:
China Relaxes Encryption Rules.
Computers & Security 19(3): 215-215 (2000) |
| 123 | | Bill Hancock:
French Card Forgery Note Could Work.
Computers & Security 19(3): 216-216 (2000) |
| 122 | | Bill Hancock:
US Law Enforcement Needs You!
Computers & Security 19(3): 216-217 (2000) |
| 121 | | Bill Hancock:
UK Law Enforcement Bemoans Criminal Activities on Interne.
Computers & Security 19(3): 217-218 (2000) |
| 120 | | Bill Hancock:
Intel Creates New Plans for Notebook Security.
Computers & Security 19(3): 218-218 (2000) |
| 119 | | Bill Hancock:
Kevin Mitnick Gets His Day in Congres.
Computers & Security 19(3): 218-219 (2000) |
| 118 | | Bill Hancock:
Web Site Owners Seek Security People Apply Now!
Computers & Security 19(3): 219-220 (2000) |
| 117 | | Bill Hancock:
Generation X Hackers?
Computers & Security 19(3): 220-221 (2000) |
| 116 | | Bill Hancock:
Suspected Hackers Arrested in Russian Credit-Card Fraud.
Computers & Security 19(4): 296-296 (2000) |
| 115 | | Bill Hancock:
Intel Eliminates ID from New Chips.
Computers & Security 19(4): 296-297 (2000) |
| 114 | | Bill Hancock:
European Parliament Doesn't Like Anonymity Online.
Computers & Security 19(4): 297-297 (2000) |
| 113 | | Bill Hancock:
DOD Finds Plans Online Reserve Unit Assesses Risk.
Computers & Security 19(4): 297-298 (2000) |
| 112 | | Bill Hancock:
Agencies Are "Own Worst Enemy".
Computers & Security 19(4): 298-298 (2000) |
| 111 | | Bill Hancock:
US Department of Energy Security Criticized - Again.
Computers & Security 19(4): 298-300 (2000) |
| 110 | | Bill Hancock:
This is What Happens When You Lose Your Computer With Classified Data On It....
Computers & Security 19(4): 300-301 (2000) |
| 109 | | Bill Hancock:
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ.
Computers & Security 19(4): 301-302 (2000) |
| 108 | | Bill Hancock:
Justice Department Conducting Criminal Probe in Former CIA Director Activities.
Computers & Security 19(4): 302-303 (2000) |
| 107 | | Bill Hancock:
Apache Site Defaced.
Computers & Security 19(4): 303-305 (2000) |
| 106 | | Bill Hancock:
US and Europe Cybercrime Agreement Problems.
Computers & Security 19(4): 306-307 (2000) |
| 105 | | Bill Hancock:
Cyberstalking on the Rise.
Computers & Security 19(4): 307-308 (2000) |
| 104 | | Bill Hancock:
Large Child Pornography Ring Busted in Texas.
Computers & Security 19(4): 308-309 (2000) |
| 103 | | Bill Hancock:
New Denial of Service Attack on Internet.
Computers & Security 19(4): 309-310 (2000) |
| 102 | | Bill Hancock:
US Supreme Court Confirms ISPs Not Liable in E-mail Messages.
Computers & Security 19(4): 310-310 (2000) |
| 101 | | Bill Hancock:
Software Scam - 17 Indicted.
Computers & Security 19(4): 310-311 (2000) |
| 100 | | Bill Hancock:
Security Views.
Computers & Security 19(5): 382-383 (2000) |
| 99 | | Bill Hancock:
"I Agree" Legal Agreements Get Legislated.
Computers & Security 19(5): 383-384 (2000) |
| 98 | | Bill Hancock:
The US Government Tells Its Users to Clean Up Their E-mail.
Computers & Security 19(5): 385-387 (2000) |
| 97 | | Bill Hancock:
Home PC's Targeted by Hackers (Duh!).
Computers & Security 19(5): 387-388 (2000) |
| 96 | | Bill Hancock:
CIO's Get Serious About Best Security Practices.
Computers & Security 19(5): 388-388 (2000) |
| 95 | | Bill Hancock:
Yahoo Faces Identity Crisis.
Computers & Security 19(5): 389-389 (2000) |
| 94 | | Bill Hancock:
Microsoft a Popular Virus Target Due to Ubiquity.
Computers & Security 19(5): 389-391 (2000) |
| 93 | | Bill Hancock:
UK's RIP Bill Creates Official Snooping.
Computers & Security 19(5): 391-392 (2000) |
| 92 | | Bill Hancock:
Extortion Going Online.
Computers & Security 19(5): 392-393 (2000) |
| 91 | | Bill Hancock:
Office 2000 Patch Recommended by CERT.
Computers & Security 19(5): 393-393 (2000) |
| 90 | | Bill Hancock:
Self-Regulation for Privacy Doesn't Work Says FTC.
Computers & Security 19(5): 393-394 (2000) |
| 89 | | Bill Hancock:
...But the Industry Wants Self-Regulation.
Computers & Security 19(5): 394-395 (2000) |
| 88 | | Bill Hancock:
US Senate Wakes Up to Need for Cybertools for Law Enforcers.
Computers & Security 19(5): 395-396 (2000) |
| 87 | | Bill Hancock:
PGP V5.0 Keys Potentially Insecure.
Computers & Security 19(5): 396-397 (2000) |
| 86 | | Bill Hancock:
Canadian Credit Card Conundrum Caused by a Cracker.
Computers & Security 19(5): 397-398 (2000) |
| 85 | | Bill Hancock:
Suspect Charged in `Love Bug' Worm has Charges Dropped.
Computers & Security 19(5): 398-398 (2000) |
| 84 | | Bill Hancock:
Network Solutions Re-evaluates Security.
Computers & Security 19(5): 398-400 (2000) |
| 83 | | Bill Hancock:
CMU Sets Up a Sister to CERT.
Computers & Security 19(5): 400-401 (2000) |
| 82 | | Bill Hancock:
Speedy Response Yields Success at DOE.
Computers & Security 19(5): 401-401 (2000) |
| 81 | | Bill Hancock:
AOL Gets Busted - Again.
Computers & Security 19(5): 402-402 (2000) |
| 80 | | Bill Hancock:
Who's to Blame?
Computers & Security 19(5): 402-403 (2000) |
| 79 | | Bill Hancock:
Wireless Ubiquity for E-Biz.
Computers & Security 19(5): 403-403 (2000) |
| 78 | | Bill Hancock:
And Now, the Bug-in-Your-Site Award Goes To....
Computers & Security 19(5): 404-404 (2000) |
| 77 | | Bill Hancock:
Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs.
Computers & Security 19(5): 404-405 (2000) |
| 76 | | Bill Hancock:
G8 Thinks About Cybercrime (It's About Time, Too).
Computers & Security 19(5): 405-407 (2000) |
| 75 | | Bill Hancock:
A Need for a Network Security Czar.
Computers & Security 19(6): 476-477 (2000) |
| 74 | | Bill Hancock:
US Government Fighting for Expanded Wiretap Laws.
Computers & Security 19(6): 477-477 (2000) |
| 73 | | Bill Hancock:
E-Commerce Paranoia: Flaws in Code.
Computers & Security 19(6): 477-479 (2000) |
| 72 | | Bill Hancock:
Truly Certified: Security Certifications Updat.
Computers & Security 19(6): 479-480 (2000) |
| 71 | | Bill Hancock:
Digital Certificates Get Creative.
Computers & Security 19(6): 480-487 (2000) |
| 70 | | Bill Hancock:
Health Care Security: A Hard Look at a Growing Problem.
Computers & Security 19(6): 482-482 (2000) |
| 69 | | Bill Hancock:
Philippine Government Creates Incident Response Team.
Computers & Security 19(6): 483-483 (2000) |
| 68 | | Bill Hancock:
Safeway UK's Website Shut Down.
Computers & Security 19(6): 483-483 (2000) |
| 67 | | Bill Hancock:
DDoS Defence Gets Regulatory.
Computers & Security 19(6): 483-485 (2000) |
| 66 | | Bill Hancock:
Visa's Ten Commandments for E-Security Online.
Computers & Security 19(6): 485-486 (2000) |
| 65 | | Bill Hancock:
`Porngate'?
Computers & Security 19(6): 486-487 (2000) |
| 64 | | Bill Hancock:
What You Sell Online in France Could Be Restricted....
Computers & Security 19(6): 487-487 (2000) |
| 63 | | Bill Hancock:
Hackers Still Love to Attack the Pentago.
Computers & Security 19(6): 488-488 (2000) |
| 62 | | Bill Hancock:
Spying At Home: A New Pastime to Detect Online Romanc.
Computers & Security 19(6): 488-491 (2000) |
| 61 | | Bill Hancock:
Is a Convicted Hacker Really Reformed and Should You Hire Them?
Computers & Security 19(6): 491-493 (2000) |
| 60 | | Bill Hancock:
DefCon Recruiting JamFest.
Computers & Security 19(6): 493-494 (2000) |
| 59 | | Bill Hancock:
Hacker Target: Mobile Phones.
Computers & Security 19(6): 494-495 (2000) |
| 58 | | Bill Hancock:
E-Mail Privacy Issues Escalate.
Computers & Security 19(6): 495-495 (2000) |
| 57 | | Bill Hancock:
GeoCities Ordered to Report on Information Poste.
Computers & Security 19(6): 495-496 (2000) |
| 56 | | Bill Hancock:
Hackers Breach Firewall.
Computers & Security 19(6): 496-497 (2000) |
| 55 | | Bill Hancock:
Lotus Domino Holes Up.
Computers & Security 19(6): 497-498 (2000) |
| 54 | | Bill Hancock:
New Classes of Unix/Linux Attacks.
Computers & Security 19(7): 570-571 (2000) |
| 53 | | Bill Hancock:
American Express Creates Disposable Credit Card Number.
Computers & Security 19(7): 571-572 (2000) |
| 52 | | Bill Hancock:
Microsoft Releases New IIS Security Tool.
Computers & Security 19(7): 572-572 (2000) |
| 51 | | Bill Hancock:
Baltimore Releases Security Developer Freeware.
Computers & Security 19(7): 572-573 (2000) |
| 50 | | Bill Hancock:
`Files Streams' Virus Infects in an Old and New Way.
Computers & Security 19(7): 573-574 (2000) |
| 49 | | Bill Hancock:
Trinity v3, a DDoS Tool, Hits the Streets.
Computers & Security 19(7): 574-574 (2000) |
| 48 | | Bill Hancock:
Hacker Insurance Now Part of the Business Risk Management Kit.
Computers & Security 19(7): 574-575 (2000) |
| 47 | | Bill Hancock:
Wireless Crazed? No Security For You!
Computers & Security 19(7): 575-577 (2000) |
| 46 | | Bill Hancock:
White House Supporting Open Source Code.
Computers & Security 19(7): 577-578 (2000) |
| 45 | | Bill Hancock:
White House Security Summit Builds Towards a B2B Security Standard.
Computers & Security 19(7): 578-579 (2000) |
| 44 | | Bill Hancock:
Cellular Security Hazards.
Computers & Security 19(7): 579-579 (2000) |
| 43 | | Bill Hancock:
UK Fuel Taxes Protestor Accused of Mass Hacking.
Computers & Security 19(7): 580-580 (2000) |
| 42 | | Bill Hancock:
US Government Board Setting Up Security Metrics.
Computers & Security 19(7): 580-580 (2000) |
| 41 | | Bill Hancock:
Privacy Group Wants `Web Bugs' Disclosures.
Computers & Security 19(7): 581-581 (2000) |
| 40 | | Bill Hancock:
Site Spoofing Becomes More Popular.
Computers & Security 19(7): 581-583 (2000) |
| 39 | | Bill Hancock:
First PDA Virus Hits the Airwaves.
Computers & Security 19(7): 583-584 (2000) |
| 38 | | Bill Hancock:
From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7.
Computers & Security 19(8): 664-665 (2000) |
| 37 | | Bill Hancock:
Feeling Sorry for Microsoft?
Computers & Security 19(8): 665-666 (2000) |
| 36 | | Bill Hancock:
However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again.
Computers & Security 19(8): 666-667 (2000) |
| 35 | | Bill Hancock:
Wireless Big Brother.
Computers & Security 19(8): 667-668 (2000) |
| 34 | | Bill Hancock:
NASA Hacker Pleads Guilty.
Computers & Security 19(8): 668-669 (2000) |
| 33 | | Bill Hancock:
Canadian Teen Mafiaboy Pleads Guilty.
Computers & Security 19(8): 669-669 (2000) |
| 32 | | Bill Hancock:
Getting the Laws to Help Combat Cybercrime (There's a grand idea).
Computers & Security 19(8): 669-670 (2000) |
| 31 | | Bill Hancock:
Internet Biz Group Calls for Cybercrime Treaty Delay.
Computers & Security 19(8): 671-671 (2000) |
| 30 | | Bill Hancock:
Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware.
Computers & Security 19(8): 671-673 (2000) |
| 29 | | Bill Hancock:
Hacktivism Increasing.
Computers & Security 19(8): 673-674 (2000) |
| 28 | | Bill Hancock:
US Department of Defense Prepares Cybercrime Database.
Computers & Security 19(8): 674-674 (2000) |
| 27 | | Bill Hancock:
CIA Chat Room Causes Grief.
Computers & Security 19(8): 674-676 (2000) |
| 26 | | Bill Hancock:
Japan Creates Cyberconditions for IT National Revolution.
Computers & Security 19(8): 676-677 (2000) |
| 25 | | Bill Hancock:
US Privacy Law Proposals Cause Concerns.
Computers & Security 19(8): 677-678 (2000) |
| 1999 |
| 24 | EE | Bill Hancock:
From the editor.
Computers & Security 18(1): 2-3 (1999) |
| 23 | EE | Bill Hancock:
Elliptical curve cryptography and standards for efficient cryptography group.
Computers & Security 18(1): 4-15 (1999) |
| 22 | EE | Bill Hancock:
From the editor.
Computers & Security 18(2): 88-89 (1999) |
| 21 | EE | Bill Hancock:
From the editor.
Computers & Security 18(3): 182-183 (1999) |
| 20 | EE | Bill Hancock:
From the editor.
Computers & Security 18(4): 276-277 (1999) |
| 19 | EE | Bill Hancock:
From the editor.
Computers & Security 18(5): 370-371 (1999) |
| 18 | EE | Bill Hancock:
From the editor.
Computers & Security 18(6): 456-457 (1999) |
| 17 | EE | Bill Hancock:
From the editor.
Computers & Security 18(7): 550-552 (1999) |
| 16 | EE | Bill Hancock:
Security views.
Computers & Security 18(7): 553-564 (1999) |
| 1998 |
| 15 | EE | Bill Hancock:
From the editor.
Computers & Security 17(1): 2-4 (1998) |
| 14 | EE | Bill Hancock:
Security goes prime-time.
Computers & Security 17(1): 5-13 (1998) |
| 13 | EE | Bill Hancock:
From the Editor.
Computers & Security 17(2): 96-97 (1998) |
| 12 | EE | Bill Hancock:
Who do you call for, CISSP.
Computers & Security 17(2): 99-109 (1998) |
| 11 | EE | Bill Hancock:
From the editor.
Computers & Security 17(3): 190-191 (1998) |
| 10 | EE | Bill Hancock:
Security Views.
Computers & Security 17(3): 192-200 (1998) |
| 9 | EE | Bill Hancock:
From the editor.
Computers & Security 17(4): 278-279 (1998) |
| 8 | EE | Bill Hancock:
Security views.
Computers & Security 17(4): 280-292 (1998) |
| 7 | EE | Bill Hancock:
From the editor.
Computers & Security 17(5): 368-369 (1998) |
| 6 | EE | Bill Hancock:
From the editor.
Computers & Security 17(6): 460-461 (1998) |
| 5 | EE | Bill Hancock:
Security tradeshows - Good or bad?
Computers & Security 17(6): 462-474 (1998) |
| 4 | EE | Bill Hancock:
From the editor.
Computers & Security 17(7): 562-563 (1998) |
| 3 | EE | Bill Hancock:
Windows-98, RIP and my Adrenaline Rush.
Computers & Security 17(7): 564-574 (1998) |
| 2 | EE | Bill Hancock:
From the editor.
Computers & Security 17(8): 652-653 (1998) |
| 1 | EE | Bill Hancock:
Security views.
Computers & Security 17(8): 654-666 (1998) |