- Jeffrey L. Ott:
Pity the Poor Hacker. Inf. Secur. J. A Glob. Perspect. 9(5): 1-3 (2000) - Ralph Spencer Poore:
Access Control Using Attribute Certificates. Inf. Secur. J. A Glob. Perspect. 9(1): 1-7 (2000) - Ralph Spencer Poore:
Privacy and the Value of Personal Data. Inf. Secur. J. A Glob. Perspect. 9(3): 1-6 (2000) - Ralph Spencer Poore:
Valuing Information Assets for Security Risk Management. Inf. Secur. J. A Glob. Perspect. 9(4): 1-7 (2000) - Ralph Spencer Poore:
Computer Forensics and Privacy: At What Price Do We Police the Internet? Inf. Secur. J. A Glob. Perspect. 9(5): 1-5 (2000) - Gerald V. Post, Albert Kagan, Stephen P. Balogh:
Security Implications of Virus Management. Inf. Secur. J. A Glob. Perspect. 9(5): 1-7 (2000) - Ben Rothke:
Should You Trust the NSA? Inf. Secur. J. A Glob. Perspect. 9(1): 1-7 (2000) - Ben Rothke:
The Growing Problem of Virus Hoaxes. Inf. Secur. J. A Glob. Perspect. 9(4): 1-6 (2000) - Erik Safsten:
Five Keys to Protecting Your Organization's E-mail. Inf. Secur. J. A Glob. Perspect. 9(5): 1-6 (2000) - Peter Stephenson:
Assessing Vulnerabilities. Inf. Secur. J. A Glob. Perspect. 9(1): 1-5 (2000) - Peter Stephenson:
Standards or Best Practices - Conflicting Interests. Inf. Secur. J. A Glob. Perspect. 9(3): 1-6 (2000) - Peter Stephenson:
Flying by the Seat of Our Pants. Inf. Secur. J. A Glob. Perspect. 9(4): 1-5 (2000) - Peter Stephenson:
It's a Strange, Strange, Strange, Strange World. Inf. Secur. J. A Glob. Perspect. 9(5): 1-6 (2000) - Farley Stewart:
Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues. Inf. Secur. J. A Glob. Perspect. 9(3): 1-7 (2000) - Jim S. Tiller, Bryan D. Fish:
Packet Sniffers and Network Monitors. Inf. Secur. J. A Glob. Perspect. 9(2): 1-8 (2000) - Jim S. Tiller, Bryan D. Fish:
Packet Sniffers and Network Monitors, Part 2. Inf. Secur. J. A Glob. Perspect. 9(3): 1-15 (2000) - John R. Vacca:
The European Data Protection Directive: A Roadblock to International Trade? Inf. Secur. J. A Glob. Perspect. 9(1): 1-10 (2000) - John R. Vacca:
The Dangerous Precedent Set in the Use of Electronic Identifiers. Inf. Secur. J. A Glob. Perspect. 9(4): 1-8 (2000)