nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addressing the silo mentality
|
Dyhouse, Tony |
|
2010 |
|
2 |
p. 43- 1 p. |
artikel |
2 |
All the world's a stage
|
Dallaway, Eleanor |
|
2009 |
|
2 |
p. 5- 1 p. |
artikel |
3 |
Assigning the data breach blame
|
Tebbutt, Peter |
|
2009 |
|
2 |
p. 32- 1 p. |
artikel |
4 |
A wolf in sheep's clothing
|
Sembhi, Sarb |
|
2010 |
|
2 |
p. 44- 1 p. |
artikel |
5 |
Bad habits die hard
|
Dallaway, Eleanor |
|
2010 |
|
2 |
p. 5- 1 p. |
artikel |
6 |
Bill Gates takes leave of RSA conference
|
McKenna, Brian |
|
2007 |
|
2 |
p. 6- 1 p. |
artikel |
7 |
Business Continuity — the Risk Management Expo and Conference 2007
|
|
|
2007 |
|
2 |
p. 28-29 2 p. |
artikel |
8 |
Check Point to revolutionise network security
|
Dallaway, Eleanor |
|
2009 |
|
2 |
p. 6- 1 p. |
artikel |
9 |
Coughs and sneezes spread diseases
|
Knight, William |
|
2008 |
|
2 |
p. 40-43 4 p. |
artikel |
10 |
Council staff breach security of National ID database
|
Stringer, Rob |
|
2009 |
|
2 |
p. 7-8 2 p. |
artikel |
11 |
Crossing the end-user application developer divide
|
Munro, Ken |
|
2007 |
|
2 |
p. 43- 1 p. |
artikel |
12 |
Cybercrime Knows No Borders
|
Moraski, Lauren |
|
2011 |
|
2 |
p. 20-23 4 p. |
artikel |
13 |
Dairy
|
|
|
2007 |
|
2 |
p. 48- 1 p. |
artikel |
14 |
Danger of the insider threat
|
McKenna, Brian |
|
2007 |
|
2 |
p. 5- 1 p. |
artikel |
15 |
Diary
|
|
|
2010 |
|
2 |
p. 47- 1 p. |
artikel |
16 |
Diary
|
|
|
2009 |
|
2 |
p. 48- 1 p. |
artikel |
17 |
Diary
|
|
|
2011 |
|
2 |
p. 47- 1 p. |
artikel |
18 |
DLP technology unplugged
|
Winder, Davey |
|
2010 |
|
2 |
p. 38-41 4 p. |
artikel |
19 |
Do it or pay
|
Arnfield, Robin |
|
2009 |
|
2 |
p. 38-41 4 p. |
artikel |
20 |
DPP has insufficient evidence to prosecute McKinnon in UK
|
Stringer, Rob |
|
2009 |
|
2 |
p. 6-7 2 p. |
artikel |
21 |
Email volumes gathering pace at breakneck speed
|
Hammerton, Neil |
|
2007 |
|
2 |
p. 44- 1 p. |
artikel |
22 |
End point security: a five-year craze?
|
Everett, Cath |
|
2007 |
|
2 |
p. 33-35 3 p. |
artikel |
23 |
Eugene Kaspersky
|
Dallaway, Eleanor |
|
2010 |
|
2 |
p. 8-9 2 p. |
artikel |
24 |
European communication crash imminent?
|
Grant, Ian |
|
2007 |
|
2 |
p. 6-7 2 p. |
artikel |
25 |
European Union to investigate internet telephony eavesdropping
|
Gold, Steve |
|
2009 |
|
2 |
p. 8- 1 p. |
artikel |
26 |
Exhibitor Listings
|
|
|
2009 |
|
2 |
p. 14- 1 p. |
artikel |
27 |
Exhibitor Listings
|
|
|
2007 |
|
2 |
p. 13-14 2 p. |
artikel |
28 |
Financial services security changes with the times
|
Pritchard, Stephen |
|
2010 |
|
2 |
p. 26-28 3 p. |
artikel |
29 |
Get ‘em young
|
Stringer, Rob |
|
2009 |
|
2 |
p. 34-37 4 p. |
artikel |
30 |
Got what it takes to be a CISO?
|
Condon, Ron |
|
2007 |
|
2 |
p. 30-32 3 p. |
artikel |
31 |
Healthcare IT professionals mistrustful of cloud security
|
|
|
2010 |
|
2 |
p. 6- 1 p. |
artikel |
32 |
High noon for virtualisation
|
Knight, William |
|
2009 |
|
2 |
p. 42-45 4 p. |
artikel |
33 |
How to cut IT security costs
|
Kilpatrick, Ian |
|
2009 |
|
2 |
p. 30- 1 p. |
artikel |
34 |
How to get ahead in show business
|
Alice, Slack |
|
2008 |
|
2 |
p. 34-35 2 p. |
artikel |
35 |
Identity theft rises from the Third World
|
Dallaway, Eleanor |
|
2007 |
|
2 |
p. 7- 1 p. |
artikel |
36 |
In brief
|
|
|
2010 |
|
2 |
p. 6- 1 p. |
artikel |
37 |
In brief
|
|
|
2009 |
|
2 |
p. 7- 1 p. |
artikel |
38 |
In brief
|
|
|
2007 |
|
2 |
p. 7- 1 p. |
artikel |
39 |
Infosecurity Europe is moving to Earls Court
|
|
|
2009 |
|
2 |
p. 11- 1 p. |
artikel |
40 |
Infosecurity Europe 2007 New Product Launches
|
|
|
2007 |
|
2 |
p. 16-18 3 p. |
artikel |
41 |
Infosecurity professionals still in demand says (ISC)2 survey
|
|
|
2010 |
|
2 |
p. 6- 1 p. |
artikel |
42 |
Insider threat monitoring is enhanced by asset relevance
|
Contos, Brian |
|
2007 |
|
2 |
p. 47- 1 p. |
artikel |
43 |
Is Key Management the New Compliance?
|
Thales, Jon Geater |
|
2011 |
|
2 |
p. 44- 1 p. |
artikel |
44 |
John Colley
|
Dallaway, Eleanor |
|
2011 |
|
2 |
p. 10-13 4 p. |
artikel |
45 |
Just the job
|
Everett, Cath |
|
2008 |
|
2 |
p. 38-39 2 p. |
artikel |
46 |
Keeping it real: Updating your security policy in 2010
|
McKenna, Brian |
|
2010 |
|
2 |
p. 18-21 4 p. |
artikel |
47 |
Keynote Sessions
|
|
|
2009 |
|
2 |
p. 20-21 2 p. |
artikel |
48 |
Keynote Sessions
|
|
|
2007 |
|
2 |
p. 22-23 2 p. |
artikel |
49 |
Know thy enemy – The rise of data breach and how best to avoid it
|
Cowper, Jamie |
|
2007 |
|
2 |
p. 45- 1 p. |
artikel |
50 |
Lack of precise definitions plagues cybersecurity legislation
|
|
|
2010 |
|
2 |
p. 11- 1 p. |
artikel |
51 |
Malware protection before infection
|
Sterlicchi, John |
|
2008 |
|
2 |
p. 9- 1 p. |
artikel |
52 |
Microsoft® Pillar Room Microsoft Forefront Security Academy 2007
|
|
|
2007 |
|
2 |
p. 25- 1 p. |
artikel |
53 |
Microsoft working on secure web browser
|
Gold, Steve |
|
2009 |
|
2 |
p. 8- 1 p. |
artikel |
54 |
Napolitano issues challenge to security community
|
|
|
2010 |
|
2 |
p. 12- 1 p. |
artikel |
55 |
National security heavyweights talk cybersecurity
|
|
|
2010 |
|
2 |
p. 12- 1 p. |
artikel |
56 |
New for 2007 – Implementation Forum
|
|
|
2007 |
|
2 |
p. 26- 1 p. |
artikel |
57 |
New internet brings security challenges
|
Cluley, Graham |
|
2007 |
|
2 |
p. 41- 1 p. |
artikel |
58 |
New products and services
|
|
|
2009 |
|
2 |
p. 18- 1 p. |
artikel |
59 |
Night Dragon Will not Be Defeated $44.99 at a Time
|
Maiffret, Marc |
|
2011 |
|
2 |
p. 45- 1 p. |
artikel |
60 |
Nonchalant about intellectual property protection?
|
Bech, Soeren |
|
2007 |
|
2 |
p. 40- 1 p. |
artikel |
61 |
Not all good things come in small packages
|
Penri-Williams, Hugh |
|
2009 |
|
2 |
p. 46- 1 p. |
artikel |
62 |
Olympia Room Keynotes and Seminars
|
|
|
2007 |
|
2 |
p. 24- 1 p. |
artikel |
63 |
PCI DSS survey shows encryption is tops when it comes to end-to-end security
|
|
|
2010 |
|
2 |
p. 10- 1 p. |
artikel |
64 |
People Are People
|
Dallaway, Eleanor |
|
2011 |
|
2 |
p. 5- 1 p. |
artikel |
65 |
Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime
|
Winder, Davey |
|
2011 |
|
2 |
p. 32-34 3 p. |
artikel |
66 |
Pitfalls and promise of social networking
|
|
|
2010 |
|
2 |
p. 10- 1 p. |
artikel |
67 |
Plan
|
|
|
2009 |
|
2 |
p. 12-13 2 p. |
artikel |
68 |
Re-defining the human factor
|
Samani, Raj |
|
2010 |
|
2 |
p. 30-33 4 p. |
artikel |
69 |
Researching the Researchers
|
Grossman, Wendy M. |
|
2011 |
|
2 |
p. 40-43 4 p. |
artikel |
70 |
Securing cloud computing is industry responsibility
|
|
|
2010 |
|
2 |
p. 11- 1 p. |
artikel |
71 |
Securing the mobile workforce
|
Cordial, Andy |
|
2010 |
|
2 |
p. 42- 1 p. |
artikel |
72 |
Security Cafés – New for 2009!
|
|
|
2009 |
|
2 |
p. 28- 1 p. |
artikel |
73 |
Security Expert Forum – New for 2009!
|
|
|
2009 |
|
2 |
p. 26-27 2 p. |
artikel |
74 |
Security on a shoestring: How to get more for less in a recession
|
Townsend, Kevin |
|
2010 |
|
2 |
p. 22-25 4 p. |
artikel |
75 |
Seminar Timetables
|
|
|
2009 |
|
2 |
p. 22-24 3 p. |
artikel |
76 |
Seminar Timetables
|
|
|
2007 |
|
2 |
p. 19-21 3 p. |
artikel |
77 |
Serious Fraud Office warns on social networking data harvesting
|
|
|
2010 |
|
2 |
p. 7- 1 p. |
artikel |
78 |
Show preview
|
|
|
2007 |
|
2 |
p. 10-12 3 p. |
artikel |
79 |
Slack space
|
|
|
2010 |
|
2 |
p. 48- 1 p. |
artikel |
80 |
Slack space
|
|
|
2009 |
|
2 |
p. 47- 1 p. |
artikel |
81 |
Slack Space
|
|
|
2011 |
|
2 |
p. 48- 1 p. |
artikel |
82 |
Smartphone apps need securing at software development stages
|
|
|
2010 |
|
2 |
p. 7- 1 p. |
artikel |
83 |
Spam defence – don't bring a knife to a gun fight
|
Henry, Paul A. |
|
2007 |
|
2 |
p. 39- 1 p. |
artikel |
84 |
Storm botnet peaks on Valentine's Day
|
Grant, Ian |
|
2008 |
|
2 |
p. 9- 1 p. |
artikel |
85 |
The battle of the internet browsers
|
Bradbury, Danny |
|
2010 |
|
2 |
p. 34-37 4 p. |
artikel |
86 |
The changing nature of the information security career
|
Colley, John |
|
2010 |
|
2 |
p. 14-17 4 p. |
artikel |
87 |
The Gods of Phishing
|
Shein, Esther |
|
2011 |
|
2 |
p. 28-31 4 p. |
artikel |
88 |
The Infosec Market in China: Proceed with Caution
|
Townsend, Kevin |
|
2011 |
|
2 |
p. 35-38 4 p. |
artikel |
89 |
The missing link in today's mobile security solutions
|
Stone, Richard |
|
2007 |
|
2 |
p. 46- 1 p. |
artikel |
90 |
The myth of fingerprints
|
Harley, David |
|
2009 |
|
2 |
p. 29- 1 p. |
artikel |
91 |
The politics of security
|
Berlich, Peter |
|
2008 |
|
2 |
p. 45- 1 p. |
artikel |
92 |
The Rise and Fall of Online Credit Fraud
|
Pritchard, Stephen |
|
2011 |
|
2 |
p. 24-27 4 p. |
artikel |
93 |
The tangled web we weave
|
Munro, Ken |
|
2007 |
|
2 |
p. 36-38 3 p. |
artikel |
94 |
The World's Dumbest Hackers
|
Bradbury, Danny |
|
2011 |
|
2 |
p. 16-19 4 p. |
artikel |
95 |
Time to Avoid the Droid?
|
Amorosi, Drew |
|
2011 |
|
2 |
p. 6-9 4 p. |
artikel |
96 |
Travelling to Olympia
|
|
|
2007 |
|
2 |
p. 9- 1 p. |
artikel |
97 |
UTMS or point solutions?
|
Kilpatrick, Ian |
|
2007 |
|
2 |
p. 42- 1 p. |
artikel |
98 |
What's new and improved at Infosecurity Europe 2009?
|
|
|
2009 |
|
2 |
p. 10- 1 p. |
artikel |
99 |
Your Guide to Infosecurity Europe 2009 at new venue Earls Court
|
|
|
2009 |
|
2 |
p. 9- 1 p. |
artikel |
100 |
Your Guide to the Show 2007
|
Jeffers, Samantha |
|
2007 |
|
2 |
p. 8- 1 p. |
artikel |