no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Events calendar
|
|
|
2005 |
2005 |
1 |
p. 20- 1 p. |
article |
2 |
Getting smart in the corporate environment
|
Brettle, Paul |
|
2005 |
2005 |
1 |
p. 12-14 3 p. |
article |
3 |
G-men pull Carnivore's teeth
|
|
|
2005 |
2005 |
1 |
p. 2-3 2 p. |
article |
4 |
In brief
|
|
|
2005 |
2005 |
1 |
p. 3- 1 p. |
article |
5 |
ISP fury at collecting more Internet statistics for law enforcement
|
|
|
2005 |
2005 |
1 |
p. 20- 1 p. |
article |
6 |
Managing an incident
|
Stephenson, Peter |
|
2005 |
2005 |
1 |
p. 17-19 3 p. |
article |
7 |
Security, innovation head CIOs' 2005 agenda
|
|
|
2005 |
2005 |
1 |
p. 1-2 2 p. |
article |
8 |
SSH goes for IBM mainframe
|
|
|
2005 |
2005 |
1 |
p. 20- 1 p. |
article |
9 |
The compleat cyber-angler: a guide to phishing
|
Rusch, Jonathan J. |
|
2005 |
2005 |
1 |
p. 4-6 3 p. |
article |
10 |
Trusting your computer to be trusted
|
Mason, Stephen |
|
2005 |
2005 |
1 |
p. 7-11 5 p. |
article |
11 |
UK Thinktank sets out rules for Internet policing
|
|
|
2005 |
2005 |
1 |
p. 3- 1 p. |
article |
12 |
Why do so many major IT projects fail?
|
Hinde, Steven |
|
2005 |
2005 |
1 |
p. 15-17 3 p. |
article |