Computers and Security
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
Table of contents
- 474
-
From the Editor| 2000
- 476
-
Security Views, Dr. Bill Hancock, CISSP| 2000
- 476
-
A Need for a Network Security CzarHancock, B. et al. | 2000
- 476
-
Security Views, Dr. Bill Hancock, CISSP - A Need for a Network Security Czar| 2000
- 477
-
US Government Fighting for Expanded Wiretap LawsHancock, B. et al. | 2000
- 477
-
Security Views, Dr. Bill Hancock, CISSP - E-Commerce Paranoia: Flaws in Code| 2000
- 477
-
E-Commerce Paranoia: Flaws in CodeHancock, B. et al. | 2000
- 477
-
Security Views, Dr. Bill Hancock, CISSP - US Government Fighting for Expanded Wiretap Laws| 2000
- 479
-
Security Views, Dr. Bill Hancock, CISSP - Truly Certified: Security Certifications Update| 2000
- 479
-
Truly Certified: Security Certifications UpdateHancock, B. et al. | 2000
- 480
-
Security Views, Dr. Bill Hancock, CISSP - Digital Certificates Get Creative| 2000
- 480
-
Digital Certificates Get CreativeHancock, B. et al. | 2000
- 482
-
Security Views, Dr. Bill Hancock, CISSP - Health Care Security: A Hard Look at a Growing Problem| 2000
- 482
-
Health Care Security: A Hard Look at a Growing ProblemHancock, B. et al. | 2000
- 483
-
DDoS Defence Gets RegulatoryHancock, B. et al. | 2000
- 483
-
Security Views, Dr. Bill Hancock, CISSP - DDoS Defence Gets Regulatory| 2000
- 483
-
Safeway UK`s Website Shut DownHancock, B. et al. | 2000
- 483
-
Security Views, Dr. Bill Hancock, CISSP - Philippine Government Creates Incident Response Team| 2000
- 483
-
Philippine Government Creates Incident Response TeamHancock, B. et al. | 2000
- 483
-
Security Views, Dr. Bill Hancock, CISSP - Safeway UK's Website Shut Down| 2000
- 485
-
Security Views, Dr. Bill Hancock, CISSP - Visa's Ten Commandments for E-Security Online| 2000
- 485
-
Visa`s Ten Commandments for E-Security OnlineHancock, B. et al. | 2000
- 486
-
`Porngate`?Hancock, B. et al. | 2000
- 486
-
Security Views, Dr. Bill Hancock, CISSP - 'Porngate'?| 2000
- 487
-
What You Sell Online in France Could Be RestrictedHancock, B. et al. | 2000
- 487
-
Security Views, Dr. Bill Hancock, CISSP - What You Sell Online in France Could Be Restricted| 2000
- 488
-
Security Views, Dr. Bill Hancock, CISSP - Hackers Still Love to Attack the Pentagon| 2000
- 488
-
Spying At Home: A New Pastime to Detect Online RomanceHancock, B. et al. | 2000
- 488
-
Security Views, Dr. Bill Hancock, CISSP - Spying At Home: A New Pastime to Detect Online Romance| 2000
- 488
-
Hackers Still Love to Attack the PentagonHancock, B. et al. | 2000
- 491
-
Security Views, Dr. Bill Hancock, CISSP - Is a Convicted Hacker Really Reformed and Should You Hire Them?| 2000
- 491
-
Is a Convicted Hacker Really Reformed and Should You Hire Them?Hancock, B. et al. | 2000
- 493
-
Security Views, Dr. Bill Hancock, CISSP - DefCon Recruiting JamFest| 2000
- 493
-
DefCon Recruiting JamFestHancock, B. et al. | 2000
- 494
-
Security Views, Dr. Bill Hancock, CISSP - Hacker Target: Mobile Phones| 2000
- 494
-
Hacker Target: Mobile PhonesHancock, B. et al. | 2000
- 495
-
E-Mail Privacy Issues EscalateHancock, B. et al. | 2000
- 495
-
Security Views, Dr. Bill Hancock, CISSP - E-Mail Privacy Issues Escalate| 2000
- 495
-
GeoCities Ordered to Report on Information PosterHancock, B. et al. | 2000
- 495
-
Security Views, Dr. Bill Hancock, CISSP - GeoCities Ordered to Report on Information Poster| 2000
- 496
-
Security Views, Dr. Bill Hancock, CISSP - 'Mafiaboy' Hit With 64 New Charges| 2000
- 496
-
Security Views, Dr. Bill Hancock, CISSP - Hackers Breach Firewall-1| 2000
- 496
-
Hackers Breach Firewall-1Hancock, B. et al. | 2000
- 496
-
`Mafiaboy` Hit With 64 New ChargesHancock, B. et al. | 2000
- 497
-
Lotus Domino Holes UpHancock, B. et al. | 2000
- 497
-
Security Views, Dr. Bill Hancock, CISSP - Lotus Domino Holes Up| 2000
- 499
-
Special Features - Fireworks, Beer and Old Halfpennies -- The Risks of AssumptionHinde, Stephen et al. | 2000
- 499
-
Fireworks, Beer and Old Halfpennies - The Risks of AssumptionHinde, S. et al. | 2000
- 505
-
Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and WhyKovacich, G. L. et al. | 2000
- 505
-
Special Features - Netspionage -- The Global Threat to Information, Part III: The Black Zone, Who Uses Netspionage, How and WhyKovacich, Gerald et al. | 2000
- 520
-
Special Features - A Mathematical Structure of Simple Defensive Network DeceptionsCohen, Fred et al. | 2000
- 520
-
A Mathematical Structure of Simple Defensive Network DeceptionsCohen, F. et al. | 2000
- 529
-
Special Features - Authentication and Supervision: A Survey of User AttitudesFurnell, S.M. et al. | 2000
- 529
-
Authentication and Supervision: A Survey of User AttitudesFurnell, S. M. / Dowland, P. S. / Illingworth, H. M. et al. | 2000
- 540
-
Abstracts of Recent Articles and LiteraturePalmer, C. et al. | 2000
- 540
-
Current Literature - Abstracts of recent articles and literature| 2000
- 547
-
Events - Calendar of forthcoming conferences and events| 2000
- 549
-
Refereed Papers - International Board of Referees| 2000
- 551
-
Refereed Papers - Ticket and Challenge-Based Protocols for TimestampingPeyravian, Mohammad et al. | 2000
- 551
-
Ticket and Challenge-Based Protocols for TimestampingPeyravian, M. / Matyas, S. M. / Roginsky, A. et al. | 2000
- 559
-
Information Security in Multiprocessor Systems Based on the X86 ArchitectureTorrubia, A. / Mora, F. J. et al. | 2000
- 559
-
Refereed Papers - Information Security in Multiprocessor Systems Based on the X86 ArchitectureTorrubia, Andres et al. | 2000
- 564
-
IFIP Technical Committee 11| 2000