Journals in DBLP
Commun. ACM 1999, volume: 42, number: 7
Diane Crawford Editorial Pointers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:5- [Journal ] Robert Fox News Track. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:9-10 [Journal ] Diane Crawford Forum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:11-13 [Journal ] Meg McGinity Telecom Act, Scene One. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:15-18 [Journal ] Neil Munro Inforwar: AK-47s, Lies, and Videotape. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:19-22 [Journal ] Scott R. Tilley The Need for Speed. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:23-26 [Journal ] John Gallaugher Challenging to New Conventional Wisdom of Net Commerce Strategies. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:27-29 [Journal ] Brajendra Panda , Joseph Giordano Defensive Information Warfare - Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:30-32 [Journal ] Shiu-Kai Chin High-Confidence Design for Security: Don't Trust - Verify. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:33-37 [Journal ] Anup K. Ghosh , Jeffrey M. Voas Inoculating Software for Survivability. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:38-44 [Journal ] Terrance Goan A Cop on the Beat Collecting and Appraising Intrusion Evidence. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:46-52 [Journal ] Robert Durst , Terrence Champion , Brian Witten , Eric Miller , Luigi Spagnuolo Testing and Evaluating: Computer Intrusion Detection Systems. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:53-61 [Journal ] Matthew Stillerman , Carla Marceau , Maureen Stillman Intrusion Detection for Distributed Applications. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:62-69 [Journal ] Sushil Jajodia , Catherine D. McCollum , Paul Ammann Trusted Recovery. [Citation Graph (0, 2)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:71-75 [Journal ] Jim Waldo The Jini Architecture for Network-Centric Computing. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:76-82 [Journal ] David W. Plummer , Larry J. Dalton , Frank Peter The Recodable Locking Device. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:83-87 [Journal ] Janice C. Sipior , Burke T. Ward The Dark Side of Employee Email. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:88-95 [Journal ] Ned Kock A Case of Academic Plagiarism. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:96-104 [Journal ] Peter G. Neumann Information is a Double-Edged Sword. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:120- [Journal ]