Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 Cisco source code stolen – but should we care? Hunter, Philip
2004
2004 7 p. 11-12
2 p.
article
2 CISSPs pass new ISO benchmark 2004
2004 7 p. 3-
1 p.
article
3 Enemies within: the problem of insider attacks Furnell, Steven
2004
2004 7 p. 6-11
6 p.
article
4 Events calendar 2004
2004 7 p. 20-
1 p.
article
5 Identity fraud: the stealth threat to UK plc Porter, David
2004
2004 7 p. 4-6
3 p.
article
6 In brief 2004
2004 7 p. 2-3
2 p.
article
7 IT controls, financial reporting and fraud Hinde, Steven
2004
2004 7 p. 13-14
2 p.
article
8 Log correlation: Part 2 Forte, Dario
2004
2004 7 p. 15-16
2 p.
article
9 PKI dies hard McKenna, Brian
2004
2004 7 p. 3-
1 p.
article
10 Russian zombie army turned back McKenna, Brian
2004
2004 7 p. 1-2
2 p.
article
11 Security managers getting act together? 2004
2004 7 p. 2-
1 p.
article
12 Using formal modeling to untangle security incidents Stephenson, Peter
2004
2004 7 p. 16-20
5 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands