Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 Authorities bust bogus Cisco hardware rackets 2008
2008 4 p. 5-
1 p.
article
2 Boeing engineer arrested for China espionage 2008
2008 4 p. 2-3
2 p.
article
3 Calendar 2008
2008 4 p. 20-
1 p.
article
4 China suspected of cyberwarfare 2008
2008 4 p. 2-
1 p.
article
5 Coming to terms with end point security Golden, Colin
2008
2008 4 p. 16-17
2 p.
article
6 Editorial Hilley, Sarah
2008
2008 4 p. 2-
1 p.
article
7 End-user security culture: A lesson that will never be learnt? Furnell, Steven
2008
2008 4 p. 6-9
4 p.
article
8 Finance advisory firm breaches Data Protection Act 2008
2008 4 p. 4-
1 p.
article
9 Firms named for ID theft 2008
2008 4 p. 14-
1 p.
article
10 Four accused of bank hack attempt 2008
2008 4 p. 5-
1 p.
article
11 FTC raps loan firm for data mishandling 2008
2008 4 p. 4-
1 p.
article
12 Getting the most from training sessions: the art of raising security awareness without curing insomnia 1 1 This is not to say that curing insomnia would be a bad thing. Goucher, Wendy
2008
2008 4 p. 15-
1 p.
article
13 In brief 2008
2008 4 p. 3-
1 p.
article
14 Indonesian hacker jailed for credit card data theft 2008
2008 4 p. 4-
1 p.
article
15 Nationwide introduces card readers for online banking 2008
2008 4 p. 4-5
2 p.
article
16 Pakistan YouTube block exposes fundamental Internet security weakness Hunter, Philip
2008
2008 4 p. 10-11
2 p.
article
17 Ready for war 2008
2008 4 p. 1-
1 p.
article
18 UK ID cards compulsory for some but not all 2008
2008 4 p. 3-4
2 p.
article
19 Unanswered questions, international intrigue and the unintended consequences of facile thinking Forte, Dario
2008
2008 4 p. 18-20
3 p.
article
20 Wig, weave or hat? The balding man's perspective on information security Goucher, Wendy
2008
2008 4 p. 12-13
2 p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands