Bill Hancock Code Paranoia about FBI Offerings to Detect DoS Infiltration. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:109-110 [Journal]
Bill Hancock CIA says Russia and China are Building CyberSpy Organization. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:110-111 [Journal]
Bill Hancock FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:111-113 [Journal]
Bill Hancock The SEC Hires CyberInvestigators to Search for Fraud. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:111-111 [Journal]
Bill Hancock In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:113-114 [Journal]
Bill Hancock Japan Web Hackers Use Chinese and US Servers. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:115-115 [Journal]
Bill Hancock US Pentagon Defense Messaging System Shows Deficiencies in Security. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:116-117 [Journal]
Bill Hancock Y2Hack Get-Together in Israel Under Political Attack. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:116-116 [Journal]
Bill Hancock Security Managers Cite Need for Real-Time Security. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:117-117 [Journal]
Steve Webb Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:128-132 [Journal]