Bill Hancock However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:666-667 [Journal]
Bill Hancock `Files Streams' Virus Infects in an Old and New Way. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:7, pp:573-574 [Journal]
Bill Hancock Hacker Insurance Now Part of the Business Risk Management Kit. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:7, pp:574-575 [Journal]
Bill Hancock White House Security Summit Builds Towards a B2B Security Standard. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:7, pp:578-579 [Journal]
Bill Hancock From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:664-665 [Journal]
Bill Hancock Getting the Laws to Help Combat Cybercrime (There's a grand idea). [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:669-670 [Journal]
Bill Hancock Internet Biz Group Calls for Cybercrime Treaty Delay. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:671-671 [Journal]
Bill Hancock Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:671-673 [Journal]
Bill Hancock Japan Creates Cyberconditions for IT National Revolution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:676-677 [Journal]
Bill Hancock China Passes Law to Promote Internet Security Supposedly. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:1, pp:7-7 [Journal]
Bill Hancock Information Warfare Highlighted as a Concern by US Government. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:1, pp:8-9 [Journal]
Bill Hancock The Chief Security Officer's Top Ten List for 2001. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:1, pp:10-14 [Journal]
Bill Hancock `Safe Harbor' Provision Adopters Few and Far Between. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:1, pp:14-15 [Journal]
Bill Hancock And Now, the Bug-in-Your-Site Award Goes To.... [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:404-404 [Journal]
Bill Hancock Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:404-405 [Journal]
Bill Hancock G8 Thinks About Cybercrime (It's About Time, Too). [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:405-407 [Journal]
Bill Hancock Health Care Security: A Hard Look at a Growing Problem. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:482-482 [Journal]
Bill Hancock What You Sell Online in France Could Be Restricted.... [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:487-487 [Journal]
Bill Hancock Spying At Home: A New Pastime to Detect Online Romanc. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:488-491 [Journal]
Bill Hancock Is a Convicted Hacker Really Reformed and Should You Hire Them? [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:491-493 [Journal]
Bill Hancock Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:6-7 [Journal]
Bill Hancock Down Under, Hacking Private Computers by the Government is Legal. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:10-12 [Journal]
Bill Hancock New York Times Fires Employees for Violating Internal E-mail Policies. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:12-12 [Journal]
Bill Hancock `Anonymizing' Software Causes Law Enforcement Concerns. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:1, pp:13-14 [Journal]
Bill Hancock Code Paranoia about FBI Offerings to Detect DoS Infiltration. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:109-110 [Journal]
Bill Hancock CIA says Russia and China are Building CyberSpy Organization. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:110-111 [Journal]
Bill Hancock The SEC Hires CyberInvestigators to Search for Fraud. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:111-111 [Journal]
Bill Hancock FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:111-113 [Journal]
Bill Hancock In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:113-114 [Journal]
Bill Hancock Japan Web Hackers Use Chinese and US Servers. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:115-115 [Journal]
Bill Hancock US Pentagon Defense Messaging System Shows Deficiencies in Security. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:116-117 [Journal]
Bill Hancock Y2Hack Get-Together in Israel Under Political Attack. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:116-116 [Journal]
Bill Hancock Security Managers Cite Need for Real-Time Security. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:2, pp:117-117 [Journal]
Bill Hancock Microsoft "Whistler" Release Posted to Internet. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:205-206 [Journal]
Bill Hancock US Senate Passes Bill to Tighten Up Government Network. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:206-207 [Journal]
Bill Hancock First Cybercrime Task Force City - Pittsburgh. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:208-208 [Journal]
Bill Hancock US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:208-208 [Journal]
Bill Hancock More on the January, 2000, NSA Computer Problems. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:209-211 [Journal]
Bill Hancock Mexico's President Under Cyberattack - Again. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:211-211 [Journal]
Bill Hancock Warning from the US Government: Companies Get Secure or... [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:214-215 [Journal]
Bill Hancock US Department of Energy Security Criticized - Again. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:298-300 [Journal]
Bill Hancock This is What Happens When You Lose Your Computer With Classified Data On It.... [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:300-301 [Journal]
Bill Hancock Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:301-302 [Journal]
Bill Hancock Justice Department Conducting Criminal Probe in Former CIA Director Activities. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:4, pp:302-303 [Journal]
Bill Hancock The US Government Tells Its Users to Clean Up Their E-mail. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:385-387 [Journal]
Bill Hancock Microsoft a Popular Virus Target Due to Ubiquity. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:389-391 [Journal]
Bill Hancock US Senate Wakes Up to Need for Cybertools for Law Enforcers. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:395-396 [Journal]