no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Addressing Privacy Issues During Disaster Recovery
|
Herold, Rebecca |
|
2006 |
14 |
6 |
p. 16-22 |
article |
2 |
Best Practices for Building a Security Operations Center
|
Kelley, Diana |
|
2006 |
14 |
6 |
p. 27-32 |
article |
3 |
Disclosure of Information Theft: The ChoicePoint Security Breach
|
Freeman, Edward H. |
|
2006 |
14 |
6 |
p. 11-15 |
article |
4 |
Don't Trust Your Vendor's Software Distribution Methodology
|
Storms, Andrew |
|
2006 |
14 |
6 |
p. 38-43 |
article |
5 |
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle
|
Kodaganallur, Viswanathan |
|
2006 |
14 |
6 |
p. 44-52 |
article |
6 |
Source Code Implications for Malcode
|
Dunham, Ken |
|
2006 |
14 |
6 |
p. 6-10 |
article |
7 |
The Inside-Out Approach to Infection Control
|
Milito, Rodolfo A. |
|
2006 |
14 |
6 |
p. 33-37 |
article |
8 |
Visa, Everywhere You Want to Be
|
Tiller, Jim |
|
2006 |
14 |
6 |
p. 2-5 |
article |
9 |
Why You Should Not Play the Numbers Game with Anti-Spyware Vendors
|
English, Ed |
|
2006 |
14 |
6 |
p. 23-26 |
article |