nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Applied Cyber-security and the Smart
|
|
|
2013 |
2013 |
10 |
p. 4- 1 p. |
artikel |
2 |
Deployment and management with next-generation firewalls
|
Erdheim, Sam |
|
2013 |
2013 |
10 |
p. 8-12 5 p. |
artikel |
3 |
Events Calendar
|
|
|
2013 |
2013 |
10 |
p. 20- 1 p. |
artikel |
4 |
From data breach to information stewardship
|
Small, Mike |
|
2013 |
2013 |
10 |
p. 5-8 4 p. |
artikel |
5 |
In brief
|
|
|
2013 |
2013 |
10 |
p. 3- 1 p. |
artikel |
6 |
Interview: Seth Hallem, Mobile Helix – the right way to mobile security
|
Mansfield-Devine, Steve |
|
2013 |
2013 |
10 |
p. 18-20 3 p. |
artikel |
7 |
Introduction to Cyber-Warfare
|
|
|
2013 |
2013 |
10 |
p. 4- 1 p. |
artikel |
8 |
IP-based technology – the future of the security industry
|
Baker, Scott |
|
2013 |
2013 |
10 |
p. 14-17 4 p. |
artikel |
9 |
Mobile malware tops one million, but Google says problem exaggerated
|
|
|
2013 |
2013 |
10 |
p. 2- 1 p. |
artikel |
10 |
Privilege management – the industry's best kept secret
|
Chappell, Brian |
|
2013 |
2013 |
10 |
p. 12-14 3 p. |
artikel |
11 |
Silk Road online drug market taken down
|
|
|
2013 |
2013 |
10 |
p. 1-2 2 p. |
artikel |