2 | 2001

Introduction
Jeffrey Voas, Guest Editor

Toward Survivable COTS-Based Systems
Nancy R. Mead, Howard F. Lipson, and Carol A. Sledge

An Ounce of Prevention and a Pound of Cure: Taking a Comprehensive Approach to Information Risk Management
Brett Young

It's About Time: Can We Actually Measure Information Security?
Winn Schwartau

Bridging E-Business and Added Trust: The Keys to E-Business Growth
Hsiaosu Hsiung, Scott Scheurich, and Frank Ferrante

Applying Aspect-Oriented Programming to Security
John Viega, J.T. Bloch, and Pravir Chandra


Next Month's Issue

Developing Wireless Distributed Applications
In the March issue of the Cutter IT Journal, we will cover the issues and opportunities involved in distributed wireless Web development. Is WAP the answer? Where does Bluetooth fit in? What will be the killer apps that put the wireless Web on the map? Tune in next month and find out!