C. Pollard Telecom fraud: The cost of doing nothing just went up. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:6, pp:437-439 [Journal]
Steven A. Hofmeyr Host intrusion prevention: Part of the operating system or on top of the operating system? [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:6, pp:440-442 [Journal]
Basie von Solms Information Security Governance - Compliance management vs operational management. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:6, pp:443-447 [Journal]
Terry L. Wiant Information security policy's impact on reporting security incidents. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:6, pp:448-459 [Journal]