no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Breaking into Bluetooth
|
Munro, Ken |
|
2008 |
2008 |
6 |
p. 4-6 3 p. |
article |
2 |
Events Calendar
|
|
|
2008 |
2008 |
6 |
p. 20- 1 p. |
article |
3 |
In brief
|
|
|
2008 |
2008 |
6 |
p. 3- 1 p. |
article |
4 |
IT security metrics: implementation and standards compliance
|
Frankland, Jane |
|
2008 |
2008 |
6 |
p. 6-9 4 p. |
article |
5 |
Open source software getting better
|
|
|
2008 |
2008 |
6 |
p. 1-2 2 p. |
article |
6 |
Proxies: A good idea whose time has passed
|
Potter, Bruce |
|
2008 |
2008 |
6 |
p. 19-20 2 p. |
article |
7 |
Researcher demonstrates Cisco rootkit
|
|
|
2008 |
2008 |
6 |
p. 2- 1 p. |
article |
8 |
Strengthening enterprise applications using trusted platform modules
|
Hardjono, Thomas |
|
2008 |
2008 |
6 |
p. 15-18 4 p. |
article |
9 |
UK plans Big Brother database
|
|
|
2008 |
2008 |
6 |
p. 2- 1 p. |
article |
10 |
Volatile data vs. data at rest: the requirements of digital forensics
|
Forte, Dario V |
|
2008 |
2008 |
6 |
p. 13-15 3 p. |
article |
11 |
Vulnerability management at the crossroads, part 2
|
Arce, Ivan |
|
2008 |
2008 |
6 |
p. 9-12 4 p. |
article |