The Jini Architecture for Network-Centric Computing.
Defensive Information Warfare - Introduction.
Challenging to New Conventional Wisdom of Net Commerce Strategies.
Telecom Act, Scene One.
Trusted Recovery.
A Case of Academic Plagiarism.
Intrusion Detection for Distributed Applications.
A Cop on the Beat Collecting and Appraising Intrusion Evidence.
Inforwar: AK-47s, Lies, and Videotape.
Testing and Evaluating: Computer Intrusion Detection Systems.
The Dark Side of Employee Email.
Information is a Double-Edged Sword.
High-Confidence Design for Security: Don't Trust - Verify.
Forum.
News Track.
The Need for Speed.
The Recodable Locking Device.
Inoculating Software for Survivability.
Editorial Pointers.