nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blueprint for secure IP
|
Stringer, Rob |
|
2009 |
|
5 |
p. 34-37 4 p. |
artikel |
2 |
Alleged MPAA DDoS attacks spark retaliatory cyber attacks
|
|
|
2010 |
|
5 |
p. 8- 1 p. |
artikel |
3 |
Anti-terrorist police data found on USB stick
|
|
|
2010 |
|
5 |
p. 9- 1 p. |
artikel |
4 |
A partial self-defence
|
Cremonini, Marco |
|
2007 |
|
5 |
p. 50- 1 p. |
artikel |
5 |
Armchair warlords and robot hordes
|
Marks, Paul |
|
2007 |
|
5 |
p. 18-19 2 p. |
artikel |
6 |
Banks should accept liability, says House of Lords
|
|
|
2008 |
|
5 |
p. 8- 1 p. |
artikel |
7 |
Barnardo's strengthens access control for database of children
|
Ashford, Warwick |
|
2008 |
|
5 |
p. 7- 1 p. |
artikel |
8 |
Battle of the sectors: Where is your data safe?
|
Pritchard, Stephen |
|
2009 |
|
5 |
p. 23-25 3 p. |
artikel |
9 |
Beware of bad Apples
|
|
|
2008 |
|
5 |
p. 9- 1 p. |
artikel |
10 |
Breaches in Billable Hours
|
Cremonini, Marco |
|
2011 |
|
5 |
p. 46- 1 p. |
artikel |
11 |
Breaking the Online Bank
|
Kritsonis, Ted |
|
2011 |
|
5 |
p. 36-39 4 p. |
artikel |
12 |
Charitable misgivings
|
Grossman, Wendy M. |
|
2010 |
|
5 |
p. 25-27 3 p. |
artikel |
13 |
Chasing fear
|
Dallaway, Eleanor |
|
2008 |
|
5 |
p. 5- 1 p. |
artikel |
14 |
Colin Clark
|
Dallaway, Eleanor |
|
2007 |
|
5 |
p. 14-17 4 p. |
artikel |
15 |
Company Index
|
|
|
2008 |
|
5 |
p. 47-50 4 p. |
artikel |
16 |
Crossing Borders: The Right Side of Wrong?
|
Grossman, Wendy M. |
|
2011 |
|
5 |
p. 22-25 4 p. |
artikel |
17 |
Cybersecurity recruitment challenge
|
Lyne, James |
|
2010 |
|
5 |
p. 37- 1 p. |
artikel |
18 |
Diary
|
|
|
2010 |
|
5 |
p. 39- 1 p. |
artikel |
19 |
Diary
|
|
|
2011 |
|
5 |
p. 47- 1 p. |
artikel |
20 |
Digging up the hacking underground
|
Bradbury, Danny |
|
2010 |
|
5 |
p. 14-17 4 p. |
artikel |
21 |
Digital DNA
|
Dallaway, Eleanor |
|
2008 |
|
5 |
p. 12- 1 p. |
artikel |
22 |
EU Notification Law Is Not Enough
|
Brunswick, Steve |
|
2011 |
|
5 |
p. 44- 1 p. |
artikel |
23 |
Finding your way: An overview of industry qualifications and associations
|
Drabwell, Peter |
|
2009 |
|
5 |
p. 26-29 4 p. |
artikel |
24 |
Four means to an end point
|
Gold, Steve |
|
2007 |
|
5 |
p. 24-27 4 p. |
artikel |
25 |
Give us this day our UTM
|
Bradbury, Danny |
|
2008 |
|
5 |
p. 14-18 5 p. |
artikel |
26 |
Google Chrome OS – bullet proof?
|
|
|
2009 |
|
5 |
p. 6- 1 p. |
artikel |
27 |
Government's RIPA change will burden law enforcement too
|
van Someren, Nicko |
|
2007 |
|
5 |
p. 13- 1 p. |
artikel |
28 |
Green Light
|
Dallaway, Eleanor |
|
2010 |
|
5 |
p. 5- 1 p. |
artikel |
29 |
Have respect for info-rights
|
Thomas, Richard |
|
2007 |
|
5 |
p. 51- 1 p. |
artikel |
30 |
How to get ahead in infosec
|
Grossman, Wendy M |
|
2008 |
|
5 |
p. 20-23 4 p. |
artikel |
31 |
In an ideal world
|
Sembhi, Sarb |
|
2009 |
|
5 |
p. 41- 1 p. |
artikel |
32 |
In brief
|
|
|
2010 |
|
5 |
p. 6- 1 p. |
artikel |
33 |
In Brief
|
|
|
2009 |
|
5 |
p. 6- 1 p. |
artikel |
34 |
In Brief
|
|
|
2008 |
|
5 |
p. 9- 1 p. |
artikel |
35 |
In brief
|
|
|
2007 |
|
5 |
p. 9- 1 p. |
artikel |
36 |
In defense of hackers
|
Amorosi, Drew |
|
2010 |
|
5 |
p. 38- 1 p. |
artikel |
37 |
Intel's acquisition of McAfee – did the chip giant pay too much?
|
|
|
2010 |
|
5 |
p. 7- 1 p. |
artikel |
38 |
IT security spending to top $20bn in 2010
|
Mathieson, SA |
|
2007 |
|
5 |
p. 9- 1 p. |
artikel |
39 |
Lords back UK data breach notification law
|
Mathieson, SA |
|
2007 |
|
5 |
p. 9- 1 p. |
artikel |
40 |
Loyalty cards: The risks and rewards
|
Everett, Cath |
|
2009 |
|
5 |
p. 17-19 3 p. |
artikel |
41 |
Malaysian government critics silenced with DDoS attacks
|
|
|
2010 |
|
5 |
p. 8- 1 p. |
artikel |
42 |
Michael Jackson's death exploited by spammers
|
|
|
2009 |
|
5 |
p. 8- 1 p. |
artikel |
43 |
Navigating the black hole of small business security
|
Pritchard, Stephen |
|
2010 |
|
5 |
p. 18-21 4 p. |
artikel |
44 |
Net hacks and hoaxes more sophisticated than ever says Network Box
|
|
|
2009 |
|
5 |
p. 8- 1 p. |
artikel |
45 |
Obstacles Facing the US Cybersecurity Initiatve
|
Donovan, Fred |
|
2011 |
|
5 |
p. 26-30 5 p. |
artikel |
46 |
61% of data losses are malicious, says study
|
|
|
2010 |
|
5 |
p. 10- 1 p. |
artikel |
47 |
‘Oracle padding’ crypto attack affects millions of ASP.NET apps
|
|
|
2010 |
|
5 |
p. 7- 1 p. |
artikel |
48 |
PatchLink acquires SecureWave
|
Dallaway, Eleanor |
|
2007 |
|
5 |
p. 8-9 2 p. |
artikel |
49 |
Patricia Titus
|
Amorosi, Drew |
|
2011 |
|
5 |
p. 9-12 4 p. |
artikel |
50 |
PCI: here to stay
|
Ilett, Dan |
|
2007 |
|
5 |
p. 20-22 3 p. |
artikel |
51 |
PCI must include priviliged identities
|
MacLeod, Calum |
|
2007 |
|
5 |
p. 13- 1 p. |
artikel |
52 |
Persistent and Evasive Attacks Uncovered
|
Winder, Davey |
|
2011 |
|
5 |
p. 40-43 4 p. |
artikel |
53 |
Powerful protection
|
Dallaway, Eleanor |
|
2007 |
|
5 |
p. 10- 1 p. |
artikel |
54 |
Product roundup
|
|
|
2008 |
|
5 |
p. 53-54 2 p. |
artikel |
55 |
Read between the lines
|
Dallaway, Eleanor |
|
2009 |
|
5 |
p. 5- 1 p. |
artikel |
56 |
RFID: Coming to a town near you
|
Gold, Steve |
|
2008 |
|
5 |
p. 28-31 4 p. |
artikel |
57 |
Robert Carr
|
Amorosi, Drew |
|
2010 |
|
5 |
p. 11-13 3 p. |
artikel |
58 |
Scandal, Spyware and Trust
|
Maclachlan, Gareth |
|
2011 |
|
5 |
p. 45- 1 p. |
artikel |
59 |
Securing third parties? Yes we CAMM!
|
Dallaway, Eleanor |
|
2010 |
|
5 |
p. 28-31 4 p. |
artikel |
60 |
Security Education: A Lesson Learned?
|
Pritchard, Stephen |
|
2011 |
|
5 |
p. 31-34 4 p. |
artikel |
61 |
Seeing is believing
|
Berlich, Peter |
|
2008 |
|
5 |
p. 51- 1 p. |
artikel |
62 |
Shopping the card sharps
|
Mathieson, SA |
|
2007 |
|
5 |
p. 7- 1 p. |
artikel |
63 |
Six months of cyber-crime
|
Stringer, Rob |
|
2008 |
|
5 |
p. 11- 1 p. |
artikel |
64 |
Six years of paper retention should be binned
|
Sheehan, Michael |
|
2007 |
|
5 |
p. 13- 1 p. |
artikel |
65 |
Slack space
|
|
|
2010 |
|
5 |
p. 40- 1 p. |
artikel |
66 |
Slack space
|
|
|
2008 |
|
5 |
p. 56- 1 p. |
artikel |
67 |
Slack space
|
|
|
2009 |
|
5 |
p. 48- 1 p. |
artikel |
68 |
Slack Space
|
|
|
2011 |
|
5 |
p. 48- 1 p. |
artikel |
69 |
Social networking: The ‘what not to do’ guide for organisations
|
McKenna, Brian |
|
2010 |
|
5 |
p. 22-24 3 p. |
artikel |
70 |
Someone Like You
|
Dallaway, Eleanor |
|
2011 |
|
5 |
p. 5- 1 p. |
artikel |
71 |
Someone's got to pay
|
Stringer, Rob |
|
2008 |
|
5 |
p. 24-27 4 p. |
artikel |
72 |
State-sector organisations to face £1m fines for ‘reckless’ breaches
|
Stringer, Rob |
|
2008 |
|
5 |
p. 9- 1 p. |
artikel |
73 |
Stolen identity
|
|
|
2008 |
|
5 |
p. 6- 1 p. |
artikel |
74 |
Summer sales attract Google and IBM
|
Mathieson, SA |
|
2007 |
|
5 |
p. 8- 1 p. |
artikel |
75 |
The black art of digital forensics
|
Gold, Steve |
|
2009 |
|
5 |
p. 12-15 4 p. |
artikel |
76 |
The coal-fired power station
|
Mathieson, SA |
|
2007 |
|
5 |
p. 11- 1 p. |
artikel |
77 |
The data conundrum
|
Samani, Raj |
|
2009 |
|
5 |
p. 43- 1 p. |
artikel |
78 |
The ID card debate
|
Winder, Davey |
|
2009 |
|
5 |
p. 30-33 4 p. |
artikel |
79 |
The information security industry needs to offer more than just security, says Secerno COO
|
Davie, Paul |
|
2009 |
|
5 |
p. 10-11 2 p. |
artikel |
80 |
The Infosecurity Buyers' Guide 2008
|
|
|
2008 |
|
5 |
p. 32-40 9 p. |
artikel |
81 |
The Spy Who Hacked Me
|
Bradbury, Danny |
|
2011 |
|
5 |
p. 14-17 4 p. |
artikel |
82 |
The user is not the enemy: How to increase infosecurity usability
|
Grossman, Wendy M. |
|
2009 |
|
5 |
p. 20-22 3 p. |
artikel |
83 |
2008: The year of the breach
|
Alice, Slack |
|
2008 |
|
5 |
p. 10- 1 p. |
artikel |
84 |
Thousands of targeted sites “the tip of the iceberg”
|
|
|
2008 |
|
5 |
p. 6- 1 p. |
artikel |
85 |
Trojans suspected of contributing to 2008 Madrid aircrash
|
|
|
2010 |
|
5 |
p. 8- 1 p. |
artikel |
86 |
UK government launches Digital Britain
|
|
|
2009 |
|
5 |
p. 7- 1 p. |
artikel |
87 |
UK's Cabinet Office publishes UK's first cybersecurity strategy
|
|
|
2009 |
|
5 |
p. 8- 1 p. |
artikel |
88 |
UK ‘super hacker’ loses final appeal against extradition
|
Sterlicchi, John |
|
2008 |
|
5 |
p. 7- 1 p. |
artikel |
89 |
Understanding the drivers for secure data storage
|
Gold, Steve |
|
2010 |
|
5 |
p. 32-35 4 p. |
artikel |
90 |
Using danger to distribute defences
|
Swimmer, Morton |
|
2007 |
|
5 |
p. 28-30 3 p. |
artikel |
91 |
Visa suspends ePassporte electronic money service
|
|
|
2010 |
|
5 |
p. 6- 1 p. |
artikel |
92 |
Watt matters – smart grid security
|
Perry, Simon |
|
2009 |
|
5 |
p. 38-40 3 p. |
artikel |
93 |
What Is Critical to Your Infrastructure?
|
Davis, Adrian |
|
2011 |
|
5 |
p. 18-21 4 p. |
artikel |
94 |
When technology collides
|
Mielonen, Jari |
|
2009 |
|
5 |
p. 45- 1 p. |
artikel |
95 |
You Dirty RAT
|
Amorosi, Drew |
|
2011 |
|
5 |
p. 6-8 3 p. |
artikel |