nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Calendar
|
|
|
2008 |
2008 |
7 |
p. 20- 1 p. |
artikel |
2 |
Data breach laws: what difference do they make?
|
|
|
2008 |
2008 |
7 |
p. 2- 1 p. |
artikel |
3 |
Don't panic: taxonomy for identity theft
|
Pemble, Matthew |
|
2008 |
2008 |
7 |
p. 7-9 3 p. |
artikel |
4 |
Editorial
|
Hilley, Sarah |
|
2008 |
2008 |
7 |
p. 2- 1 p. |
artikel |
5 |
Guaranteeing convergence in security management with consolidated log management
|
Forte, Dario |
|
2008 |
2008 |
7 |
p. 5-6 2 p. |
artikel |
6 |
In Brief
|
|
|
2008 |
2008 |
7 |
p. 3- 1 p. |
artikel |
7 |
Politician stands down from parliament over erosion of civil liberties
|
|
|
2008 |
2008 |
7 |
p. 3- 1 p. |
artikel |
8 |
Shooting the messenger
|
Goucher, Wendy |
|
2008 |
2008 |
7 |
p. 19-20 2 p. |
artikel |
9 |
Social networking: the focus for new threats — and old ones
|
Hunter, Philip |
|
2008 |
2008 |
7 |
p. 17-18 2 p. |
artikel |
10 |
Société Générale releases fraud investigation findings
|
|
|
2008 |
2008 |
7 |
p. 2-3 2 p. |
artikel |
11 |
The scarlet laptop
|
Goucher, Wendy |
|
2008 |
2008 |
7 |
p. 4- 1 p. |
artikel |
12 |
The security and privacy impact of criminalising the distribution of hacking tools
|
Katos, Vasilios |
|
2008 |
2008 |
7 |
p. 9-16 8 p. |
artikel |
13 |
The time has come for a see all strategy
|
|
|
2008 |
2008 |
7 |
p. 1- 1 p. |
artikel |
14 |
When security causes its own type of harm…
|
|
|
2008 |
2008 |
7 |
p. 16- 1 p. |
artikel |