Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             14 results found
no title author magazine year volume issue page(s) type
1 Calendar 2008
2008 5 p. 20-
1 p.
article
2 Controversy surrounds Phorm 2008
2008 5 p. 4-
1 p.
article
3 Digging deeper for evidence 2008
2008 5 p. 4-
1 p.
article
4 Editorial Hilley, Sarah
2008
2008 5 p. 2-
1 p.
article
5 In Brief 2008
2008 5 p. 3-
1 p.
article
6 Insecure routers and switches threaten US tax data 2008
2008 5 p. 2-3
2 p.
article
7 ISPs warned: respect privacy 2008
2008 5 p. 1-
1 p.
article
8 PayPal, FBI and others wage war on Botnet armies. Can they succeed? Hunter, Philip
2008
2008 5 p. 13-15
3 p.
article
9 Restricted is not embarrassing enough Goucher, Wendy
2008
2008 5 p. 15-16
2 p.
article
10 Testing our defences or defending our tests: the obstacles to performing security assessment references Furnell, Steven
2008
2008 5 p. 8-12
5 p.
article
11 The impact of cybersecurity on real world, big picture, planetary problems Power, Richard
2008
2008 5 p. 16-20
5 p.
article
12 TJX pays up 2008
2008 5 p. 3-4
2 p.
article
13 UK security strategy sidelines electronic threat 2008
2008 5 p. 3-
1 p.
article
14 Writing secure software is just difficult or plainly impossible? Pasquinucci, Andrea
2008
2008 5 p. 5-7
3 p.
article
                             14 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands