Information Security, Volume 60 door Martin Zelkowitz