Table of contents
Dissecting the “Hacker Manifesto”
S.M. Furnell, P.S. Dowland, P.W. SandersTwelve years ago, a text was written within the hacking community which is widely referred to as the “Hacker Manifesto”. This text, and the opinions that it offers, have since…
An introduction to automated intrusion detection approaches
Rod Hart, Darren Morgan, Hai TranDefines and categorizes the types of intrusions that can be made on information systems. Characterizes a good intrusion detection system and examines and compares commercial…
Digital signatures and the future of documentation
Stephen WilsonWhile the business world has been moving inexorably online ever since the PC appeared, documentation itself has remained paper based for the most part. Paper of course has several…
Step‐by‐step guideline for designing and documenting the navigation structure of multimedia hypertext systems
Eng Huat NgMost traditional navigational design techniques do not provide a good mechanism for dealing with the complexity of the navigational path of multimedia hypertext (or hypermedia…
The evolution of certificate model architecture
Carrie Liddy, Alice SturgeonMany products and enterprise solutions are becoming available to ensure seamless, secured electronic transactions, all of which must find common trust. This paper reviews the…