The Community for Technology Leaders
Green Image
Issue No. 01 - January-February (vol. 1)
ISSN: 1540-7993
From the Editor
Data Forensics

Remembrance of Data Passed: A Study of Disk Sanitization Practices (Abstract)

Simson L. Garfinkel , Massachusetts Institute of Technology
Abhi Shelat , Massachusetts Institute of Technology
pp. 17-27
Wireless Network Security

The Dangers of Mitigating Security Design Flaws: A Wireless Case Study (Abstract)

Nick L. Petroni Jr. , University of Maryland, College Park
William A. Arbaugh , University of Maryland, College Park
pp. 28-36
Open-Source Security

Software Security for Open-Source Systems (Abstract)

Crispin Cowan , WireX Communications
pp. 38-45
Intrusion Alert Correlation

Validation of Sensor Alert Correlators (Abstract)

Joshua Haines , MIT Lincoln Laboratory
Dorene Kewley Ryder , BBN Technologies
Laura Tinnel , Teknowledge
Stephen Taylor , Dartmouth College
pp. 46-56
Secure Coding

Inside the Windows Security Push (Abstract)

Michael Howard , Microsoft
Steve Lipner , Microsoft
pp. 57-61
Biblio Tech

AI Bites Man? (Abstract)

pp. 63-66

What Is Computer Security? (Abstract)

Matt Bishop , University of California, Davis
pp. 67-69
On the Horizon
Digital Rights

Copyright Extension: Eldred v. Ashcroft (Abstract)

Michael Lesk , Internet Archive
pp. 76-78
Global Perspectives
Attack Trends

An Analysis of the Slapper Worm (Abstract)

Iván Arce , Core Security Technologies
Elias Levy , Symantec Corporation
pp. 82-87
Threats Perspective

Fairy Dust, Secrets, and the Real World (Abstract)

S.W. Smith , Darthmouth College
pp. 89-93
Application Security

Software Protection: Security's Last Stand? (Abstract)

Martin R. Stytz , Air Force Research Laboratory
James A. Whittaker , Flordia Tech
pp. 95-98
Privacy Matters

Privacy vs. Information Technology (Abstract)

Michael Caloyannides , Mitretek Systems
pp. 100-103
Log Off

We Are All Security Consumers (Abstract)

Bruce Schneier , Counterpane Internet Security
pp. 104
93 ms
(Ver 3.3 (11022016))