December 2004, Volume 29, Number 6

Table of Contents
Letter to the Editor (PDF)
Wireless Security: A Discussion (PDF)
Editor's Thoughts (a.k.a. Musings) Rik Farrow (PDF)
SECURITY

Spyware and Rootkits: The Future Convergence James Butler and Sherri Sparks (PDF)

Putting Trust in Software Code Chris Wysopal (PDF)

Combining Port Knocking and Passive OS Fingerprinting with fwknop Michael Rash (PDF)

Improving Security with Homebrew System Modifications Steven Alexander (PDF)

Sebek Web "ITA" Interface Dario Forte, Davide Bertoletti,
Cristiano Maruti, and Michele Zambelli (PDF)

Strike Back Jennifer S. Granick (PDF)

SSO/RSO/USO/Oh No? Michael B. Scher (PDF)

Being Awash in Keys Eliot Lear (PDF)

Biological Models of Security for Virus Propagation in Computer Networks Sanjay Goel and Stephen F. Bush (PDF)

Extracting the Lessons of Multics Jonathan S. Shapiro (PDF)
BOOK REVIEWS

The Bookworm Peter H. Salus (PDF)

Book Reviews Reviewed by Rik Farrow (PDF)
USENIX NOTES (PDF)

USACO: The International Finals Rob Kolstad

Thanks to Our Volunteers Ellie Young
CONFERENCE REPORTS

13th USENIX Security Symposium (Security '04) (PDF)
