The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (vol.3)
ISSN: 1540-7993
From the Editors
Book Reviews
Software Development
Axelle Apvrille , Ericsson Research Canada
Makan Pourzandi , Ericsson Research Canada
pp. 10-17
Attack Models
Helayne T. Ray , SI Government Solutions
Raghunath Vemuri , Motorola
Hariprasad R. Kantubhukta , Progressive Insurance
pp. 18-25
Michael Bailey , University of Michigan
Evan Cooke , University of Michigan
Farnam Jahanian , University of Michigan
David Watson , University of Michigan
Jose Nazario , Arbor Networks
pp. 26-31
Vulnerability Disclosure
Dimitrios Lekkas , University of the Aegean
Diomidis Spinellis , Athens University of Economics and Business
pp. 32-41
Conference Reports
EICAR 2005 (Abstract)
pp. 45-48
Matt Bishop , University of California, Davis
Deborah Frincke , Pacific Northwest National Laboratories
pp. 49-51
On the Horizon
James Mulvenon , Defense Group Inc.
pp. 52-55
Crypto Corner
Security Usability (Abstract)
Peter Gutmann , University of Auckland
Ian Grigg , Systemics
pp. 56-58
Basic Training
Computer Forensics (Abstract)
William H. Allen , Florida Institute of Technology
pp. 59-62
Attack Trends
Iv? Arce , Core Security Technologies
pp. 63-67
Secure Systems
Sara Sinclair , Dartmouth College
S.W. Smith , Dartmouth College
pp. 68-71
Digital Protection
Martin R. Stytz , Institute for Defense Analyses
pp. 72-74
Building Security In
Nancy R. Mead , Software Engineering Institute
Gary McGraw , Cigital
pp. 75-79
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool