no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Calendar
|
|
|
2008 |
2008 |
5 |
p. 20- 1 p. |
article |
2 |
Controversy surrounds Phorm
|
|
|
2008 |
2008 |
5 |
p. 4- 1 p. |
article |
3 |
Digging deeper for evidence
|
|
|
2008 |
2008 |
5 |
p. 4- 1 p. |
article |
4 |
Editorial
|
Hilley, Sarah |
|
2008 |
2008 |
5 |
p. 2- 1 p. |
article |
5 |
In Brief
|
|
|
2008 |
2008 |
5 |
p. 3- 1 p. |
article |
6 |
Insecure routers and switches threaten US tax data
|
|
|
2008 |
2008 |
5 |
p. 2-3 2 p. |
article |
7 |
ISPs warned: respect privacy
|
|
|
2008 |
2008 |
5 |
p. 1- 1 p. |
article |
8 |
PayPal, FBI and others wage war on Botnet armies. Can they succeed?
|
Hunter, Philip |
|
2008 |
2008 |
5 |
p. 13-15 3 p. |
article |
9 |
Restricted is not embarrassing enough
|
Goucher, Wendy |
|
2008 |
2008 |
5 |
p. 15-16 2 p. |
article |
10 |
Testing our defences or defending our tests: the obstacles to performing security assessment references
|
Furnell, Steven |
|
2008 |
2008 |
5 |
p. 8-12 5 p. |
article |
11 |
The impact of cybersecurity on real world, big picture, planetary problems
|
Power, Richard |
|
2008 |
2008 |
5 |
p. 16-20 5 p. |
article |
12 |
TJX pays up
|
|
|
2008 |
2008 |
5 |
p. 3-4 2 p. |
article |
13 |
UK security strategy sidelines electronic threat
|
|
|
2008 |
2008 |
5 |
p. 3- 1 p. |
article |
14 |
Writing secure software is just difficult or plainly impossible?
|
Pasquinucci, Andrea |
|
2008 |
2008 |
5 |
p. 5-7 3 p. |
article |