Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             11 results found
no title author magazine year volume issue page(s) type
1 Behavioural analysis Mortleman, Jim
2009
2009 8 p. 5-7
3 p.
article
2 Cyber attacks increasingly target wealthy smartphone owners, says Cisco 2009
2009 8 p. 1-
1 p.
article
3 Events Calendar 2009
2009 8 p. 20-
1 p.
article
4 Flaws and patching in Las Vegas 2009
2009 8 p. 1-2
2 p.
article
5 In brief 2009
2009 8 p. 3-
1 p.
article
6 Numeric data integrity: piercing the corporate veil Frankland, Jane
2009
2009 8 p. 11-14
4 p.
article
7 Rogueware now a major menace 2009
2009 8 p. 2-
1 p.
article
8 Security in a virtualised world Sloan, Kevin
2009
2009 8 p. 15-18
4 p.
article
9 Special problems of securing 10Gbps networks Barry, Daniel Joseph
2009
2009 8 p. 8-11
4 p.
article
10 The role of the Information Security Manager in cutting-edge companies Forte, Dario V
2009
2009 8 p. 4-5
2 p.
article
11 The SCADA challenge: securing critical infrastructure Gold, Steve
2009
2009 8 p. 18-20
3 p.
article
                             11 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands