The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 03 - May-June (vol. 2)
ISSN: 1540-7993
From the Editor
Book Reviews
Interface

Letters to the Editor (HTML)

pp. 8-9
News
Special Report

Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report (Abstract)

Watts Humphrey , Software Engineering Institute
Gary McGraw , Cigital
Samuel T. Redwine Jr. , James Madison University
Noopur Davis , Software Engineering Institute
pp. 18-25
Making Wireless Work

Guest Editor's Introduction: Wired on Wireless (HTML)

William A. Arbaugh , University of Maryland
pp. 26-27

A Survey of Secure Wireless Ad Hoc Routing (Abstract)

Adrian Perrig , Carnegie Mellon University
Yih-Chun Hu , University of California, Berkeley
pp. 28-39

Autonomic 802.11 Wireless LAN Security Auditing (Abstract)

Joel W. Branch , Rensselaer Polytechnic Institute
Nick L. Petroni Jr. , University of Maryland
David Safford , IBM T.J. Watson Research Center
Leendert Van Doorn , IBM T.J. Watson Research Center
pp. 56-65
Biblio Tech

Cult Classics (Abstract)

pp. 66-68
Education

Guarding the Castle Keep: Teaching with the Fortress Metaphor (Abstract)

Matt Bishop , University of California, Davis
Deborah A. Frincke , Pacific Northwest National Laboratory
pp. 69-72
On the Horizon

Worm and Attack Early Warning (Abstract)

Salvatore J. Stolfo , Columbia University
pp. 73-75
Digital Rights

Copyright and Creativity (Abstract)

Michael Lesk , Rutgers University
pp. 76-78
Attack Trends

The Kernel Craze (Abstract)

Iva? Arce , Core Security Technologies
pp. 79-81
Secure Systems

Online Impersonation in Securities Scams (Abstract)

Mark F. Vilardo , US Securities and Exchange Commission
pp. 82-85
Application Security

The Wrong Stuff? (Abstract)

Richard Ford , Florida Institute of Technology
pp. 86-89
Building Security In

Misuse and Abuse Cases: Getting Past the Positive (Abstract)

Gary McGraw , Cigital
Paco Hope , Cigital
Annie I. Ant? , North Carolina State University
pp. 90-92
Privacy Matters

Security or Cosmetology? (Abstract)

Michael A. Caloyannides , Mitretek Systems
pp. 93-95
Clear Text

Security and Compliance (Abstract)

Bruce Schneier , Counterpane Internet Security
pp. 96
111 ms
(Ver 3.1 (10032016))