Digital Library
Close
Browse articles from a journal
Search for
Magazine
Article
ISSN
NBN article
NBN magazine
DARE/NARCIS document
with title:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal description
All volumes of the corresponding journal
All issues of the corresponding volume
All articles of the corresponding issues
20 results found
no
title
author
magazine
year
volume
issue
page(s)
type
1
Authorities bust bogus Cisco hardware rackets
2008
2008
4
p. 5-
1 p.
article
2
Boeing engineer arrested for China espionage
2008
2008
4
p. 2-3
2 p.
article
3
Calendar
2008
2008
4
p. 20-
1 p.
article
4
China suspected of cyberwarfare
2008
2008
4
p. 2-
1 p.
article
5
Coming to terms with end point security
Golden, Colin
2008
2008
4
p. 16-17
2 p.
article
6
Editorial
Hilley, Sarah
2008
2008
4
p. 2-
1 p.
article
7
End-user security culture: A lesson that will never be learnt?
Furnell, Steven
2008
2008
4
p. 6-9
4 p.
article
8
Finance advisory firm breaches Data Protection Act
2008
2008
4
p. 4-
1 p.
article
9
Firms named for ID theft
2008
2008
4
p. 14-
1 p.
article
10
Four accused of bank hack attempt
2008
2008
4
p. 5-
1 p.
article
11
FTC raps loan firm for data mishandling
2008
2008
4
p. 4-
1 p.
article
12
Getting the most from training sessions: the art of raising security awareness without curing insomnia 1 1 This is not to say that curing insomnia would be a bad thing.
Goucher, Wendy
2008
2008
4
p. 15-
1 p.
article
13
In brief
2008
2008
4
p. 3-
1 p.
article
14
Indonesian hacker jailed for credit card data theft
2008
2008
4
p. 4-
1 p.
article
15
Nationwide introduces card readers for online banking
2008
2008
4
p. 4-5
2 p.
article
16
Pakistan YouTube block exposes fundamental Internet security weakness
Hunter, Philip
2008
2008
4
p. 10-11
2 p.
article
17
Ready for war
2008
2008
4
p. 1-
1 p.
article
18
UK ID cards compulsory for some but not all
2008
2008
4
p. 3-4
2 p.
article
19
Unanswered questions, international intrigue and the unintended consequences of facile thinking
Forte, Dario
2008
2008
4
p. 18-20
3 p.
article
20
Wig, weave or hat? The balding man's perspective on information security
Goucher, Wendy
2008
2008
4
p. 12-13
2 p.
article
20 results found
Koninklijke Bibliotheek -
National Library of the Netherlands