Journals in DBLP
Bill Hancock New Classes of Unix/Linux Attacks. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:570-571 [Journal ] Bill Hancock American Express Creates Disposable Credit Card Number. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:571-572 [Journal ] Bill Hancock Microsoft Releases New IIS Security Tool. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:572-572 [Journal ] Bill Hancock Baltimore Releases Security Developer Freeware. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:572-573 [Journal ] Bill Hancock `Files Streams' Virus Infects in an Old and New Way. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:573-574 [Journal ] Bill Hancock Trinity v3, a DDoS Tool, Hits the Streets. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:574-574 [Journal ] Bill Hancock Hacker Insurance Now Part of the Business Risk Management Kit. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:574-575 [Journal ] Bill Hancock Wireless Crazed? No Security For You! [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:575-577 [Journal ] Bill Hancock White House Supporting Open Source Code. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:577-578 [Journal ] Bill Hancock White House Security Summit Builds Towards a B2B Security Standard. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:578-579 [Journal ] Bill Hancock Cellular Security Hazards. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:579-579 [Journal ] Bill Hancock UK Fuel Taxes Protestor Accused of Mass Hacking. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:580-580 [Journal ] Bill Hancock US Government Board Setting Up Security Metrics. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:580-580 [Journal ] Bill Hancock Privacy Group Wants `Web Bugs' Disclosures. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:581-581 [Journal ] Bill Hancock Site Spoofing Becomes More Popular. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:581-583 [Journal ] Bill Hancock First PDA Virus Hits the Airwaves. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:583-584 [Journal ] Stephen Hinde Do You Know Your Organization's Achilles Heel? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:585-590 [Journal ] August Bequai Romancing The Internet And Management's Quagmire. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:591-595 [Journal ] Julie D. Nosworthy A Practical Risk Analysis Approach: Managing BCM Risk. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:596-614 [Journal ] Basie von Solms Information Security - The Third Wave? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:615-620 [Journal ] Rachael Pond , John Podd , Julie Bunnell , Ron Henderson Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:645-656 [Journal ]