nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A diet that will send you bananas
|
Cremonini, Marco |
|
2008 |
|
7 |
p. 46- 1 p. |
artikel |
2 |
A fluid identity
|
Cremonini, Marco |
|
2007 |
|
7 |
p. 43- 1 p. |
artikel |
3 |
A history of security spending
|
Mathieson, SA |
|
2007 |
|
7 |
p. 5- 1 p. |
artikel |
4 |
A messy but worthy read
|
Cremonini, Marco |
|
2009 |
|
7 |
p. 45- 1 p. |
artikel |
5 |
Anatomy of a CISO
|
Winder, Davey |
|
2009 |
|
7 |
p. 24-26 3 p. |
artikel |
6 |
An industry born of necessity
|
Dallaway, Eleanor |
|
2007 |
|
7 |
p. 18-20 3 p. |
artikel |
7 |
A smart phone?
|
Knight, William |
|
2009 |
|
7 |
p. 32-35 4 p. |
artikel |
8 |
Awareness training 2.0
|
McKenna, Brian |
|
2009 |
|
7 |
p. 18-20 3 p. |
artikel |
9 |
Biometric ID card due for release
|
|
|
2008 |
|
7 |
p. 10- 1 p. |
artikel |
10 |
Biometrics Conference 2009 show coverage
|
|
|
2009 |
|
7 |
p. 10- 1 p. |
artikel |
11 |
CFET 2007, Canterbury, UK, 6–7 september
|
Edgar-Nevill, Denis |
|
2007 |
|
7 |
p. 12-13 2 p. |
artikel |
12 |
Companies need policing and tighter policies
|
Miller, Greg |
|
2007 |
|
7 |
p. 15- 1 p. |
artikel |
13 |
Complying to a false sense of security
|
Grossman, Wendy M. |
|
2008 |
|
7 |
p. 24-27 4 p. |
artikel |
14 |
Cryptography set to enter its prime
|
Stringer, Rob |
|
2008 |
|
7 |
p. 8- 1 p. |
artikel |
15 |
Data angels needed
|
Clark, Gary |
|
2008 |
|
7 |
p. 4- 1 p. |
artikel |
16 |
Diary
|
|
|
2009 |
|
7 |
p. 47- 1 p. |
artikel |
17 |
Double jeopardy
|
James, Mick |
|
2007 |
|
7 |
p. 28-30 3 p. |
artikel |
18 |
Email treasure chest
|
Yearwood, Ken |
|
2009 |
|
7 |
p. 40- 1 p. |
artikel |
19 |
Face-off in Oxford
|
Mathieson, SA |
|
2007 |
|
7 |
p. 32-35 4 p. |
artikel |
20 |
2FA comes of age
|
Abraham, Dave |
|
2009 |
|
7 |
p. 44- 1 p. |
artikel |
21 |
Fake virus, worm and malware alerts target online shoppers
|
|
|
2009 |
|
7 |
p. 6- 1 p. |
artikel |
22 |
Gartner IT security summit, London, 17-19 september
|
Mathieson, SA |
|
2007 |
|
7 |
p. 8- 1 p. |
artikel |
23 |
German firm develops world's first “Trojan-proof” password system
|
Gold, Steve |
|
2008 |
|
7 |
p. 8- 1 p. |
artikel |
24 |
Google calls for world-wide privacy standard
|
Mathieson, SA |
|
2007 |
|
7 |
p. 6- 1 p. |
artikel |
25 |
Hackers exploit Tiger Woods' car accident
|
|
|
2009 |
|
7 |
p. 7- 1 p. |
artikel |
26 |
Health staff view ‘secure’ celebrity record
|
Collins, Tony |
|
2007 |
|
7 |
p. 7- 1 p. |
artikel |
27 |
HSBC develops new authentication system
|
Thomson, Rebecca |
|
2007 |
|
7 |
p. 7- 1 p. |
artikel |
28 |
ICO to make data protection compliance easier
|
|
|
2009 |
|
7 |
p. 8- 1 p. |
artikel |
29 |
Inattention heightens IT risks
|
|
|
2007 |
|
7 |
p. 9- 1 p. |
artikel |
30 |
In Brief
|
|
|
2009 |
|
7 |
p. 6- 1 p. |
artikel |
31 |
In brief
|
|
|
2007 |
|
7 |
p. 7- 1 p. |
artikel |
32 |
In Brief
|
|
|
2008 |
|
7 |
p. 9- 1 p. |
artikel |
33 |
Information security executive of the year United Kingdom and Ireland award
|
Dallaway, Eleanor |
|
2007 |
|
7 |
p. 16-17 2 p. |
artikel |
34 |
(ISC)2 rolls out two new courses for information security professionals
|
Stringer, Rob |
|
2008 |
|
7 |
p. 12-13 2 p. |
artikel |
35 |
ISSE/Secure 2007, warsaw, Poland, 25–27 september
|
Dallaway, Eleanor |
|
2007 |
|
7 |
p. 10- 1 p. |
artikel |
36 |
Lumension sticks to specialisation
|
Mathieson, SA |
|
2007 |
|
7 |
p. 6- 1 p. |
artikel |
37 |
Manufacturing IP Securely
|
Sterlicchi, John |
|
2008 |
|
7 |
p. 31-33 3 p. |
artikel |
38 |
McKinnon may get judicial review of case
|
|
|
2009 |
|
7 |
p. 6- 1 p. |
artikel |
39 |
Microsoft denies security patch causes Windows 7 black screen problems
|
|
|
2009 |
|
7 |
p. 7- 1 p. |
artikel |
40 |
More than meets the eye
|
Gold, Steve |
|
2008 |
|
7 |
p. 38-41 4 p. |
artikel |
41 |
Only human
|
Cater, Nick |
|
2008 |
|
7 |
p. 4- 1 p. |
artikel |
42 |
Preserving Bletchley Park
|
Berlich, Peter |
|
2009 |
|
7 |
p. 28-31 4 p. |
artikel |
43 |
Product roundup
|
|
|
2007 |
|
7 |
p. 45-46 2 p. |
artikel |
44 |
Protecting what matters
|
Bradbury, Danny |
|
2008 |
|
7 |
p. 34-37 4 p. |
artikel |
45 |
ROI more important than ever
|
Dodt, Ansgar |
|
2008 |
|
7 |
p. 4- 1 p. |
artikel |
46 |
RSA Conference Europe 2009 show coverage
|
|
|
2009 |
|
7 |
p. 12-13 2 p. |
artikel |
47 |
Secure software may be decades away
|
|
|
2007 |
|
7 |
p. 8- 1 p. |
artikel |
48 |
Security holds back cloud adoption
|
|
|
2009 |
|
7 |
p. 6- 1 p. |
artikel |
49 |
Simply the best
|
Dallaway, Eleanor |
|
2008 |
|
7 |
p. 7- 1 p. |
artikel |
50 |
Slack space
|
|
|
2009 |
|
7 |
p. 48- 1 p. |
artikel |
51 |
Slack space
|
|
|
2007 |
|
7 |
p. 48- 1 p. |
artikel |
52 |
Slack space
|
|
|
2008 |
|
7 |
p. 48- 1 p. |
artikel |
53 |
Something missing
|
Hacker, David |
|
2008 |
|
7 |
p. 4- 1 p. |
artikel |
54 |
Strokes of genius?
|
Evans, Steve |
|
2007 |
|
7 |
p. 15- 1 p. |
artikel |
55 |
Talking about a revolution
|
Lacey, David |
|
2008 |
|
7 |
p. 28-30 3 p. |
artikel |
56 |
Telcos should prepare for retention
|
Brewer, Ross |
|
2007 |
|
7 |
p. 15- 1 p. |
artikel |
57 |
The economics of cybercrime
|
Chai, Ben |
|
2009 |
|
7 |
p. 36-39 4 p. |
artikel |
58 |
The politics of storing official data
|
Grossman, Wendy M. |
|
2009 |
|
7 |
p. 21-23 3 p. |
artikel |
59 |
The re-inventing Valley
|
Dallaway, Eleanor |
|
2008 |
|
7 |
p. 14-18 5 p. |
artikel |
60 |
To boldly make the quantum leap
|
Woodward, Alan |
|
2007 |
|
7 |
p. 40-42 3 p. |
artikel |
61 |
Two TJX hackers plead guilty
|
|
|
2008 |
|
7 |
p. 10- 1 p. |
artikel |
62 |
Two worlds no longer apart
|
Walters, Richard |
|
2009 |
|
7 |
p. 43- 1 p. |
artikel |
63 |
Under Pressure
|
Dallaway, Eleanor |
|
2009 |
|
7 |
p. 5- 1 p. |
artikel |
64 |
US donates to British code-cracking history
|
Stringer, Rob |
|
2008 |
|
7 |
p. 9- 1 p. |
artikel |
65 |
WebAlert to warn companies of infected websites
|
Stringer, Rob |
|
2008 |
|
7 |
p. 10- 1 p. |
artikel |
66 |
We’ve been expecting you, Mr Bond
|
Condon, Ron |
|
2007 |
|
7 |
p. 26-27 2 p. |
artikel |
67 |
When security meets law
|
Moretti, Alessandro |
|
2008 |
|
7 |
p. 45- 1 p. |
artikel |
68 |
When two become one
|
|
|
2008 |
|
7 |
p. 20-23 4 p. |
artikel |
69 |
Who do you think you are?
|
Everett, Cath |
|
2009 |
|
7 |
p. 14-17 4 p. |
artikel |
70 |
Windows autorun trojan tops November malware chart
|
|
|
2009 |
|
7 |
p. 8- 1 p. |
artikel |
71 |
Zero-day, but not zero-risk
|
Everett, Cath |
|
2007 |
|
7 |
p. 36-39 4 p. |
artikel |