Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             10 results found
no title author magazine year volume issue page(s) type
1 Events calendar 2006
2006 7 p. 20-
1 p.
article
2 In brief 2006
2006 7 p. 3-
1 p.
article
3 Is on-chip security the answer for mobile devices? Hunter, Philip
2006
2006 7 p. 15-17
3 p.
article
4 Jekyll and Hyde ‘hacking’ software could break law 2006
2006 7 p. 2-3
2 p.
article
5 Managing risk exposure Stanton, Ray
2006
2006 7 p. 17-20
4 p.
article
6 NASA hacker too costly to trial in UK 2006
2006 7 p. 2-
1 p.
article
7 Securing the building blocks of system architecture Thomson, Mark
2006
2006 7 p. 9-10
2 p.
article
8 Serious Fraud Office admits problem 2006
2006 7 p. 3-
1 p.
article
9 Thwart the insider threat: a proactive approach to personnel security Power, Richard
2006
2006 7 p. 10-15
6 p.
article
10 Where have the worms and viruses gone?—new trends in malware Schultz, E. Eugene
2006
2006 7 p. 4-8
5 p.
article
                             10 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands