no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Events calendar
|
|
|
2006 |
2006 |
7 |
p. 20- 1 p. |
article |
2 |
In brief
|
|
|
2006 |
2006 |
7 |
p. 3- 1 p. |
article |
3 |
Is on-chip security the answer for mobile devices?
|
Hunter, Philip |
|
2006 |
2006 |
7 |
p. 15-17 3 p. |
article |
4 |
Jekyll and Hyde ‘hacking’ software could break law
|
|
|
2006 |
2006 |
7 |
p. 2-3 2 p. |
article |
5 |
Managing risk exposure
|
Stanton, Ray |
|
2006 |
2006 |
7 |
p. 17-20 4 p. |
article |
6 |
NASA hacker too costly to trial in UK
|
|
|
2006 |
2006 |
7 |
p. 2- 1 p. |
article |
7 |
Securing the building blocks of system architecture
|
Thomson, Mark |
|
2006 |
2006 |
7 |
p. 9-10 2 p. |
article |
8 |
Serious Fraud Office admits problem
|
|
|
2006 |
2006 |
7 |
p. 3- 1 p. |
article |
9 |
Thwart the insider threat: a proactive approach to personnel security
|
Power, Richard |
|
2006 |
2006 |
7 |
p. 10-15 6 p. |
article |
10 |
Where have the worms and viruses gone?—new trends in malware
|
Schultz, E. Eugene |
|
2006 |
2006 |
7 |
p. 4-8 5 p. |
article |