Computer security: selected articles