Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             95 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blueprint for secure IP Stringer, Rob
2009
5 p. 34-37
4 p.
artikel
2 Alleged MPAA DDoS attacks spark retaliatory cyber attacks 2010
5 p. 8-
1 p.
artikel
3 Anti-terrorist police data found on USB stick 2010
5 p. 9-
1 p.
artikel
4 A partial self-defence Cremonini, Marco
2007
5 p. 50-
1 p.
artikel
5 Armchair warlords and robot hordes Marks, Paul
2007
5 p. 18-19
2 p.
artikel
6 Banks should accept liability, says House of Lords 2008
5 p. 8-
1 p.
artikel
7 Barnardo's strengthens access control for database of children Ashford, Warwick
2008
5 p. 7-
1 p.
artikel
8 Battle of the sectors: Where is your data safe? Pritchard, Stephen
2009
5 p. 23-25
3 p.
artikel
9 Beware of bad Apples 2008
5 p. 9-
1 p.
artikel
10 Breaches in Billable Hours Cremonini, Marco
2011
5 p. 46-
1 p.
artikel
11 Breaking the Online Bank Kritsonis, Ted
2011
5 p. 36-39
4 p.
artikel
12 Charitable misgivings Grossman, Wendy M.
2010
5 p. 25-27
3 p.
artikel
13 Chasing fear Dallaway, Eleanor
2008
5 p. 5-
1 p.
artikel
14 Colin Clark Dallaway, Eleanor
2007
5 p. 14-17
4 p.
artikel
15 Company Index 2008
5 p. 47-50
4 p.
artikel
16 Crossing Borders: The Right Side of Wrong? Grossman, Wendy M.
2011
5 p. 22-25
4 p.
artikel
17 Cybersecurity recruitment challenge Lyne, James
2010
5 p. 37-
1 p.
artikel
18 Diary 2010
5 p. 39-
1 p.
artikel
19 Diary 2011
5 p. 47-
1 p.
artikel
20 Digging up the hacking underground Bradbury, Danny
2010
5 p. 14-17
4 p.
artikel
21 Digital DNA Dallaway, Eleanor
2008
5 p. 12-
1 p.
artikel
22 EU Notification Law Is Not Enough Brunswick, Steve
2011
5 p. 44-
1 p.
artikel
23 Finding your way: An overview of industry qualifications and associations Drabwell, Peter
2009
5 p. 26-29
4 p.
artikel
24 Four means to an end point Gold, Steve
2007
5 p. 24-27
4 p.
artikel
25 Give us this day our UTM Bradbury, Danny
2008
5 p. 14-18
5 p.
artikel
26 Google Chrome OS – bullet proof? 2009
5 p. 6-
1 p.
artikel
27 Government's RIPA change will burden law enforcement too van Someren, Nicko
2007
5 p. 13-
1 p.
artikel
28 Green Light Dallaway, Eleanor
2010
5 p. 5-
1 p.
artikel
29 Have respect for info-rights Thomas, Richard
2007
5 p. 51-
1 p.
artikel
30 How to get ahead in infosec Grossman, Wendy M
2008
5 p. 20-23
4 p.
artikel
31 In an ideal world Sembhi, Sarb
2009
5 p. 41-
1 p.
artikel
32 In brief 2010
5 p. 6-
1 p.
artikel
33 In Brief 2009
5 p. 6-
1 p.
artikel
34 In Brief 2008
5 p. 9-
1 p.
artikel
35 In brief 2007
5 p. 9-
1 p.
artikel
36 In defense of hackers Amorosi, Drew
2010
5 p. 38-
1 p.
artikel
37 Intel's acquisition of McAfee – did the chip giant pay too much? 2010
5 p. 7-
1 p.
artikel
38 IT security spending to top $20bn in 2010 Mathieson, SA
2007
5 p. 9-
1 p.
artikel
39 Lords back UK data breach notification law Mathieson, SA
2007
5 p. 9-
1 p.
artikel
40 Loyalty cards: The risks and rewards Everett, Cath
2009
5 p. 17-19
3 p.
artikel
41 Malaysian government critics silenced with DDoS attacks 2010
5 p. 8-
1 p.
artikel
42 Michael Jackson's death exploited by spammers 2009
5 p. 8-
1 p.
artikel
43 Navigating the black hole of small business security Pritchard, Stephen
2010
5 p. 18-21
4 p.
artikel
44 Net hacks and hoaxes more sophisticated than ever says Network Box 2009
5 p. 8-
1 p.
artikel
45 Obstacles Facing the US Cybersecurity Initiatve Donovan, Fred
2011
5 p. 26-30
5 p.
artikel
46 61% of data losses are malicious, says study 2010
5 p. 10-
1 p.
artikel
47 ‘Oracle padding’ crypto attack affects millions of ASP.NET apps 2010
5 p. 7-
1 p.
artikel
48 PatchLink acquires SecureWave Dallaway, Eleanor
2007
5 p. 8-9
2 p.
artikel
49 Patricia Titus Amorosi, Drew
2011
5 p. 9-12
4 p.
artikel
50 PCI: here to stay Ilett, Dan
2007
5 p. 20-22
3 p.
artikel
51 PCI must include priviliged identities MacLeod, Calum
2007
5 p. 13-
1 p.
artikel
52 Persistent and Evasive Attacks Uncovered Winder, Davey
2011
5 p. 40-43
4 p.
artikel
53 Powerful protection Dallaway, Eleanor
2007
5 p. 10-
1 p.
artikel
54 Product roundup 2008
5 p. 53-54
2 p.
artikel
55 Read between the lines Dallaway, Eleanor
2009
5 p. 5-
1 p.
artikel
56 RFID: Coming to a town near you Gold, Steve
2008
5 p. 28-31
4 p.
artikel
57 Robert Carr Amorosi, Drew
2010
5 p. 11-13
3 p.
artikel
58 Scandal, Spyware and Trust Maclachlan, Gareth
2011
5 p. 45-
1 p.
artikel
59 Securing third parties? Yes we CAMM! Dallaway, Eleanor
2010
5 p. 28-31
4 p.
artikel
60 Security Education: A Lesson Learned? Pritchard, Stephen
2011
5 p. 31-34
4 p.
artikel
61 Seeing is believing Berlich, Peter
2008
5 p. 51-
1 p.
artikel
62 Shopping the card sharps Mathieson, SA
2007
5 p. 7-
1 p.
artikel
63 Six months of cyber-crime Stringer, Rob
2008
5 p. 11-
1 p.
artikel
64 Six years of paper retention should be binned Sheehan, Michael
2007
5 p. 13-
1 p.
artikel
65 Slack space 2010
5 p. 40-
1 p.
artikel
66 Slack space 2008
5 p. 56-
1 p.
artikel
67 Slack space 2009
5 p. 48-
1 p.
artikel
68 Slack Space 2011
5 p. 48-
1 p.
artikel
69 Social networking: The ‘what not to do’ guide for organisations McKenna, Brian
2010
5 p. 22-24
3 p.
artikel
70 Someone Like You Dallaway, Eleanor
2011
5 p. 5-
1 p.
artikel
71 Someone's got to pay Stringer, Rob
2008
5 p. 24-27
4 p.
artikel
72 State-sector organisations to face £1m fines for ‘reckless’ breaches Stringer, Rob
2008
5 p. 9-
1 p.
artikel
73 Stolen identity 2008
5 p. 6-
1 p.
artikel
74 Summer sales attract Google and IBM Mathieson, SA
2007
5 p. 8-
1 p.
artikel
75 The black art of digital forensics Gold, Steve
2009
5 p. 12-15
4 p.
artikel
76 The coal-fired power station Mathieson, SA
2007
5 p. 11-
1 p.
artikel
77 The data conundrum Samani, Raj
2009
5 p. 43-
1 p.
artikel
78 The ID card debate Winder, Davey
2009
5 p. 30-33
4 p.
artikel
79 The information security industry needs to offer more than just security, says Secerno COO Davie, Paul
2009
5 p. 10-11
2 p.
artikel
80 The Infosecurity Buyers' Guide 2008 2008
5 p. 32-40
9 p.
artikel
81 The Spy Who Hacked Me Bradbury, Danny
2011
5 p. 14-17
4 p.
artikel
82 The user is not the enemy: How to increase infosecurity usability Grossman, Wendy M.
2009
5 p. 20-22
3 p.
artikel
83 2008: The year of the breach Alice, Slack
2008
5 p. 10-
1 p.
artikel
84 Thousands of targeted sites “the tip of the iceberg” 2008
5 p. 6-
1 p.
artikel
85 Trojans suspected of contributing to 2008 Madrid aircrash 2010
5 p. 8-
1 p.
artikel
86 UK government launches Digital Britain 2009
5 p. 7-
1 p.
artikel
87 UK's Cabinet Office publishes UK's first cybersecurity strategy 2009
5 p. 8-
1 p.
artikel
88 UK ‘super hacker’ loses final appeal against extradition Sterlicchi, John
2008
5 p. 7-
1 p.
artikel
89 Understanding the drivers for secure data storage Gold, Steve
2010
5 p. 32-35
4 p.
artikel
90 Using danger to distribute defences Swimmer, Morton
2007
5 p. 28-30
3 p.
artikel
91 Visa suspends ePassporte electronic money service 2010
5 p. 6-
1 p.
artikel
92 Watt matters – smart grid security Perry, Simon
2009
5 p. 38-40
3 p.
artikel
93 What Is Critical to Your Infrastructure? Davis, Adrian
2011
5 p. 18-21
4 p.
artikel
94 When technology collides Mielonen, Jari
2009
5 p. 45-
1 p.
artikel
95 You Dirty RAT Amorosi, Drew
2011
5 p. 6-8
3 p.
artikel
                             95 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland