Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             11 results found
no title author magazine year volume issue page(s) type
1 Breaking into Bluetooth Munro, Ken
2008
2008 6 p. 4-6
3 p.
article
2 Events Calendar 2008
2008 6 p. 20-
1 p.
article
3 In brief 2008
2008 6 p. 3-
1 p.
article
4 IT security metrics: implementation and standards compliance Frankland, Jane
2008
2008 6 p. 6-9
4 p.
article
5 Open source software getting better 2008
2008 6 p. 1-2
2 p.
article
6 Proxies: A good idea whose time has passed Potter, Bruce
2008
2008 6 p. 19-20
2 p.
article
7 Researcher demonstrates Cisco rootkit 2008
2008 6 p. 2-
1 p.
article
8 Strengthening enterprise applications using trusted platform modules Hardjono, Thomas
2008
2008 6 p. 15-18
4 p.
article
9 UK plans Big Brother database 2008
2008 6 p. 2-
1 p.
article
10 Volatile data vs. data at rest: the requirements of digital forensics Forte, Dario V
2008
2008 6 p. 13-15
3 p.
article
11 Vulnerability management at the crossroads, part 2 Arce, Ivan
2008
2008 6 p. 9-12
4 p.
article
                             11 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands