no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Behavioural analysis
|
Mortleman, Jim |
|
2009 |
2009 |
8 |
p. 5-7 3 p. |
article |
2 |
Cyber attacks increasingly target wealthy smartphone owners, says Cisco
|
|
|
2009 |
2009 |
8 |
p. 1- 1 p. |
article |
3 |
Events Calendar
|
|
|
2009 |
2009 |
8 |
p. 20- 1 p. |
article |
4 |
Flaws and patching in Las Vegas
|
|
|
2009 |
2009 |
8 |
p. 1-2 2 p. |
article |
5 |
In brief
|
|
|
2009 |
2009 |
8 |
p. 3- 1 p. |
article |
6 |
Numeric data integrity: piercing the corporate veil
|
Frankland, Jane |
|
2009 |
2009 |
8 |
p. 11-14 4 p. |
article |
7 |
Rogueware now a major menace
|
|
|
2009 |
2009 |
8 |
p. 2- 1 p. |
article |
8 |
Security in a virtualised world
|
Sloan, Kevin |
|
2009 |
2009 |
8 |
p. 15-18 4 p. |
article |
9 |
Special problems of securing 10Gbps networks
|
Barry, Daniel Joseph |
|
2009 |
2009 |
8 |
p. 8-11 4 p. |
article |
10 |
The role of the Information Security Manager in cutting-edge companies
|
Forte, Dario V |
|
2009 |
2009 |
8 |
p. 4-5 2 p. |
article |
11 |
The SCADA challenge: securing critical infrastructure
|
Gold, Steve |
|
2009 |
2009 |
8 |
p. 18-20 3 p. |
article |