nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Calendar
|
|
|
2008 |
2008 |
5 |
p. 20- 1 p. |
artikel |
2 |
Controversy surrounds Phorm
|
|
|
2008 |
2008 |
5 |
p. 4- 1 p. |
artikel |
3 |
Digging deeper for evidence
|
|
|
2008 |
2008 |
5 |
p. 4- 1 p. |
artikel |
4 |
Editorial
|
Hilley, Sarah |
|
2008 |
2008 |
5 |
p. 2- 1 p. |
artikel |
5 |
In Brief
|
|
|
2008 |
2008 |
5 |
p. 3- 1 p. |
artikel |
6 |
Insecure routers and switches threaten US tax data
|
|
|
2008 |
2008 |
5 |
p. 2-3 2 p. |
artikel |
7 |
ISPs warned: respect privacy
|
|
|
2008 |
2008 |
5 |
p. 1- 1 p. |
artikel |
8 |
PayPal, FBI and others wage war on Botnet armies. Can they succeed?
|
Hunter, Philip |
|
2008 |
2008 |
5 |
p. 13-15 3 p. |
artikel |
9 |
Restricted is not embarrassing enough
|
Goucher, Wendy |
|
2008 |
2008 |
5 |
p. 15-16 2 p. |
artikel |
10 |
Testing our defences or defending our tests: the obstacles to performing security assessment references
|
Furnell, Steven |
|
2008 |
2008 |
5 |
p. 8-12 5 p. |
artikel |
11 |
The impact of cybersecurity on real world, big picture, planetary problems
|
Power, Richard |
|
2008 |
2008 |
5 |
p. 16-20 5 p. |
artikel |
12 |
TJX pays up
|
|
|
2008 |
2008 |
5 |
p. 3-4 2 p. |
artikel |
13 |
UK security strategy sidelines electronic threat
|
|
|
2008 |
2008 |
5 |
p. 3- 1 p. |
artikel |
14 |
Writing secure software is just difficult or plainly impossible?
|
Pasquinucci, Andrea |
|
2008 |
2008 |
5 |
p. 5-7 3 p. |
artikel |