no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A novel architecture for enhanced security through virtualisation and spoofing
|
Sridevi, R |
|
2009 |
2009 |
9 |
p. 12-16 5 p. |
article |
2 |
Carpe sus: security in the time of swine flu
|
Goucher, Wendy |
|
2009 |
2009 |
9 |
p. 18-20 3 p. |
article |
3 |
Compliance vs business security
|
Forte, Dario |
|
2009 |
2009 |
9 |
p. 16-18 3 p. |
article |
4 |
Events Calendar
|
|
|
2009 |
2009 |
9 |
p. 20- 1 p. |
article |
5 |
Failed firm banned from selling customers' personal data
|
|
|
2009 |
2009 |
9 |
p. 1- 1 p. |
article |
6 |
ID theft malware on the increase
|
|
|
2009 |
2009 |
9 |
p. 1-2 2 p. |
article |
7 |
In brief
|
|
|
2009 |
2009 |
9 |
p. 3- 1 p. |
article |
8 |
Massive website infection avoids detection by search engine security scanners
|
|
|
2009 |
2009 |
9 |
p. 1- 1 p. |
article |
9 |
Moving across to the dark side
|
Everett, Cath |
|
2009 |
2009 |
9 |
p. 10-12 3 p. |
article |
10 |
The hidden benefits of optimising your firewall
|
Garlick, Nick |
|
2009 |
2009 |
9 |
p. 6-9 4 p. |
article |
11 |
US lab develops federated model for defence against cyber attack
|
|
|
2009 |
2009 |
9 |
p. 2- 1 p. |
article |
12 |
Why 2FA in the cloud?
|
Abraham, Dave |
|
2009 |
2009 |
9 |
p. 4-5 2 p. |
article |