Bill Hancock Health Care Security: A Hard Look at a Growing Problem. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:482-482 [Journal]
Bill Hancock Philippine Government Creates Incident Response Team. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:483-483 [Journal]
Bill Hancock What You Sell Online in France Could Be Restricted.... [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:487-487 [Journal]
Bill Hancock Spying At Home: A New Pastime to Detect Online Romanc. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:488-491 [Journal]
Bill Hancock Is a Convicted Hacker Really Reformed and Should You Hire Them? [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:491-493 [Journal]
Stephen Hinde Fireworks, Beer and Old Halfpennies - The Risks of Assumption. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:499-504 [Journal]
Gerald L. Kovacich Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:505-519 [Journal]
Fred Cohen A Mathematical Structure of Simple Defensive Network Deception. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:520-528 [Journal]