nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Beyond the PIN: Enhancing user authentication for mobile devices
|
Furnell, Steven |
|
2008 |
2008 |
8 |
p. 12-17 6 p. |
artikel |
2 |
Calendar
|
|
|
2008 |
2008 |
8 |
p. 20- 1 p. |
artikel |
3 |
Countrywide employee arrested
|
|
|
2008 |
2008 |
8 |
p. 2-3 2 p. |
artikel |
4 |
Economics of ICT security
|
Pasquinucci, Andrea |
|
2008 |
2008 |
8 |
p. 4-6 3 p. |
artikel |
5 |
Editorial
|
Bradbury, Danny |
|
2008 |
2008 |
8 |
p. 2- 1 p. |
artikel |
6 |
How ready are you for the Companies Act?
|
Gold, Steve |
|
2008 |
2008 |
8 |
p. 9-11 3 p. |
artikel |
7 |
In Brief
|
|
|
2008 |
2008 |
8 |
p. 3- 1 p. |
artikel |
8 |
Internet scrambles to fix major DNS flaw
|
|
|
2008 |
2008 |
8 |
p. 3- 1 p. |
artikel |
9 |
McKinnon loses court appeal
|
|
|
2008 |
2008 |
8 |
p. 3- 1 p. |
artikel |
10 |
Paper cuts: security in non-digital written media
|
Goucher, Wendy |
|
2008 |
2008 |
8 |
p. 11-12 2 p. |
artikel |
11 |
The complexity of living like a snail – the dangers of the ‘fuzzy boundary’
|
Goucher, Wendy |
|
2008 |
2008 |
8 |
p. 7-8 2 p. |
artikel |
12 |
TJX hackers caught
|
|
|
2008 |
2008 |
8 |
p. 1-2 2 p. |
artikel |
13 |
War & Peace in Cyberspace: Don't twitter away your organisation's secrets
|
Power, Richard |
|
2008 |
2008 |
8 |
p. 18-20 3 p. |
artikel |