nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A review of L0phtCrack 6
|
Potter, Bruce |
|
2009 |
2009 |
7 |
p. 14-17 4 p. |
artikel |
2 |
Are you court validated?
|
Forte, Dario |
|
2009 |
2009 |
7 |
p. 6-8 3 p. |
artikel |
3 |
Bonn discovers partial solution to Conficker infections
|
|
|
2009 |
2009 |
7 |
p. 2- 1 p. |
artikel |
4 |
Events calendar
|
|
|
2009 |
2009 |
7 |
p. 20- 1 p. |
artikel |
5 |
Finger pointed at North Korea after denial of service attacks on the South and the US
|
|
|
2009 |
2009 |
7 |
p. 1-2 2 p. |
artikel |
6 |
In a recession, disgruntled employees could pose a security threat from within
|
|
|
2009 |
2009 |
7 |
p. 1- 1 p. |
artikel |
7 |
In brief
|
|
|
2009 |
2009 |
7 |
p. 3- 1 p. |
artikel |
8 |
NHS computer viruses impact on patient healthcare
|
|
|
2009 |
2009 |
7 |
p. 2- 1 p. |
artikel |
9 |
The enemy within
|
Goucher, Wendy |
|
2009 |
2009 |
7 |
p. 12-14 3 p. |
artikel |
10 |
The importance of log files in security incident prevention
|
Forte, Dario |
|
2009 |
2009 |
7 |
p. 18-20 3 p. |
artikel |
11 |
The promise of whitelisting
|
Mansfield-Devine, Steve |
|
2009 |
2009 |
7 |
p. 4-6 3 p. |
artikel |
12 |
Understanding and exploiting the reverse patterns of peer-to-peer file sharing applications
|
Caviglione, Luca |
|
2009 |
2009 |
7 |
p. 8-12 5 p. |
artikel |