Bill Hancock US Department of Energy Security Criticized - Again. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:298-300 [Journal]
Bill Hancock This is What Happens When You Lose Your Computer With Classified Data On It.... [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:300-301 [Journal]
Bill Hancock Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:301-302 [Journal]
Bill Hancock Justice Department Conducting Criminal Probe in Former CIA Director Activities. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:302-303 [Journal]
Stephen Hinde Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:312-320 [Journal]
Richard Barber Security in a Mobile World Is Bluetooth the Answer? [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:321-325 [Journal]
Gerald L. Kovacich Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care? [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:326-336 [Journal]
Julie D. Nosworthy Implementing Information Security In The 21st Century Do You Have the Balancing Factors? [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:337-347 [Journal]