no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
De-Perimeterisation: Benefits and limitations
|
Palmer, Graham |
|
2005 |
10 |
4 |
p. 189-203 15 p. |
article |
2 |
Editorial: “The security perimeter”
|
Price, G. |
|
2005 |
10 |
4 |
p. 185- 1 p. |
article |
3 |
Firewalls – Are they enough protection for current networks?
|
Stuart Broderick, J. |
|
2005 |
10 |
4 |
p. 204-212 9 p. |
article |
4 |
Inventing the future – The vision of the Jericho Forum
|
Lacey, David |
|
2005 |
10 |
4 |
p. 186-188 3 p. |
article |
5 |
The extended security perimeter
|
Walker, John |
|
2005 |
10 |
4 |
p. 220-227 8 p. |
article |
6 |
The Laws of Vulnerabilities: Which security vulnerabilities really matter?
|
Eschelbeck, Gerhard |
|
2005 |
10 |
4 |
p. 213-219 7 p. |
article |
7 |
Web services: Developers dream or hackers heaven?
|
Curphey, Mark |
|
2005 |
10 |
4 |
p. 228-235 8 p. |
article |
8 |
Why ‘Phish’ when you can Trawl?
|
Cracknell, Phil |
|
2005 |
10 |
4 |
p. 236-239 4 p. |
article |