Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             71 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A diet that will send you bananas Cremonini, Marco
2008
7 p. 46-
1 p.
artikel
2 A fluid identity Cremonini, Marco
2007
7 p. 43-
1 p.
artikel
3 A history of security spending Mathieson, SA
2007
7 p. 5-
1 p.
artikel
4 A messy but worthy read Cremonini, Marco
2009
7 p. 45-
1 p.
artikel
5 Anatomy of a CISO Winder, Davey
2009
7 p. 24-26
3 p.
artikel
6 An industry born of necessity Dallaway, Eleanor
2007
7 p. 18-20
3 p.
artikel
7 A smart phone? Knight, William
2009
7 p. 32-35
4 p.
artikel
8 Awareness training 2.0 McKenna, Brian
2009
7 p. 18-20
3 p.
artikel
9 Biometric ID card due for release 2008
7 p. 10-
1 p.
artikel
10 Biometrics Conference 2009 show coverage 2009
7 p. 10-
1 p.
artikel
11 CFET 2007, Canterbury, UK, 6–7 september Edgar-Nevill, Denis
2007
7 p. 12-13
2 p.
artikel
12 Companies need policing and tighter policies Miller, Greg
2007
7 p. 15-
1 p.
artikel
13 Complying to a false sense of security Grossman, Wendy M.
2008
7 p. 24-27
4 p.
artikel
14 Cryptography set to enter its prime Stringer, Rob
2008
7 p. 8-
1 p.
artikel
15 Data angels needed Clark, Gary
2008
7 p. 4-
1 p.
artikel
16 Diary 2009
7 p. 47-
1 p.
artikel
17 Double jeopardy James, Mick
2007
7 p. 28-30
3 p.
artikel
18 Email treasure chest Yearwood, Ken
2009
7 p. 40-
1 p.
artikel
19 Face-off in Oxford Mathieson, SA
2007
7 p. 32-35
4 p.
artikel
20 2FA comes of age Abraham, Dave
2009
7 p. 44-
1 p.
artikel
21 Fake virus, worm and malware alerts target online shoppers 2009
7 p. 6-
1 p.
artikel
22 Gartner IT security summit, London, 17-19 september Mathieson, SA
2007
7 p. 8-
1 p.
artikel
23 German firm develops world's first “Trojan-proof” password system Gold, Steve
2008
7 p. 8-
1 p.
artikel
24 Google calls for world-wide privacy standard Mathieson, SA
2007
7 p. 6-
1 p.
artikel
25 Hackers exploit Tiger Woods' car accident 2009
7 p. 7-
1 p.
artikel
26 Health staff view ‘secure’ celebrity record Collins, Tony
2007
7 p. 7-
1 p.
artikel
27 HSBC develops new authentication system Thomson, Rebecca
2007
7 p. 7-
1 p.
artikel
28 ICO to make data protection compliance easier 2009
7 p. 8-
1 p.
artikel
29 Inattention heightens IT risks 2007
7 p. 9-
1 p.
artikel
30 In Brief 2009
7 p. 6-
1 p.
artikel
31 In brief 2007
7 p. 7-
1 p.
artikel
32 In Brief 2008
7 p. 9-
1 p.
artikel
33 Information security executive of the year United Kingdom and Ireland award Dallaway, Eleanor
2007
7 p. 16-17
2 p.
artikel
34 (ISC)2 rolls out two new courses for information security professionals Stringer, Rob
2008
7 p. 12-13
2 p.
artikel
35 ISSE/Secure 2007, warsaw, Poland, 25–27 september Dallaway, Eleanor
2007
7 p. 10-
1 p.
artikel
36 Lumension sticks to specialisation Mathieson, SA
2007
7 p. 6-
1 p.
artikel
37 Manufacturing IP Securely Sterlicchi, John
2008
7 p. 31-33
3 p.
artikel
38 McKinnon may get judicial review of case 2009
7 p. 6-
1 p.
artikel
39 Microsoft denies security patch causes Windows 7 black screen problems 2009
7 p. 7-
1 p.
artikel
40 More than meets the eye Gold, Steve
2008
7 p. 38-41
4 p.
artikel
41 Only human Cater, Nick
2008
7 p. 4-
1 p.
artikel
42 Preserving Bletchley Park Berlich, Peter
2009
7 p. 28-31
4 p.
artikel
43 Product roundup 2007
7 p. 45-46
2 p.
artikel
44 Protecting what matters Bradbury, Danny
2008
7 p. 34-37
4 p.
artikel
45 ROI more important than ever Dodt, Ansgar
2008
7 p. 4-
1 p.
artikel
46 RSA Conference Europe 2009 show coverage 2009
7 p. 12-13
2 p.
artikel
47 Secure software may be decades away 2007
7 p. 8-
1 p.
artikel
48 Security holds back cloud adoption 2009
7 p. 6-
1 p.
artikel
49 Simply the best Dallaway, Eleanor
2008
7 p. 7-
1 p.
artikel
50 Slack space 2009
7 p. 48-
1 p.
artikel
51 Slack space 2007
7 p. 48-
1 p.
artikel
52 Slack space 2008
7 p. 48-
1 p.
artikel
53 Something missing Hacker, David
2008
7 p. 4-
1 p.
artikel
54 Strokes of genius? Evans, Steve
2007
7 p. 15-
1 p.
artikel
55 Talking about a revolution Lacey, David
2008
7 p. 28-30
3 p.
artikel
56 Telcos should prepare for retention Brewer, Ross
2007
7 p. 15-
1 p.
artikel
57 The economics of cybercrime Chai, Ben
2009
7 p. 36-39
4 p.
artikel
58 The politics of storing official data Grossman, Wendy M.
2009
7 p. 21-23
3 p.
artikel
59 The re-inventing Valley Dallaway, Eleanor
2008
7 p. 14-18
5 p.
artikel
60 To boldly make the quantum leap Woodward, Alan
2007
7 p. 40-42
3 p.
artikel
61 Two TJX hackers plead guilty 2008
7 p. 10-
1 p.
artikel
62 Two worlds no longer apart Walters, Richard
2009
7 p. 43-
1 p.
artikel
63 Under Pressure Dallaway, Eleanor
2009
7 p. 5-
1 p.
artikel
64 US donates to British code-cracking history Stringer, Rob
2008
7 p. 9-
1 p.
artikel
65 WebAlert to warn companies of infected websites Stringer, Rob
2008
7 p. 10-
1 p.
artikel
66 We’ve been expecting you, Mr Bond Condon, Ron
2007
7 p. 26-27
2 p.
artikel
67 When security meets law Moretti, Alessandro
2008
7 p. 45-
1 p.
artikel
68 When two become one 2008
7 p. 20-23
4 p.
artikel
69 Who do you think you are? Everett, Cath
2009
7 p. 14-17
4 p.
artikel
70 Windows autorun trojan tops November malware chart 2009
7 p. 8-
1 p.
artikel
71 Zero-day, but not zero-risk Everett, Cath
2007
7 p. 36-39
4 p.
artikel
                             71 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland