Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             13 results found
no title author magazine year volume issue page(s) type
1 Beyond the PIN: Enhancing user authentication for mobile devices Furnell, Steven
2008
2008 8 p. 12-17
6 p.
article
2 Calendar 2008
2008 8 p. 20-
1 p.
article
3 Countrywide employee arrested 2008
2008 8 p. 2-3
2 p.
article
4 Economics of ICT security Pasquinucci, Andrea
2008
2008 8 p. 4-6
3 p.
article
5 Editorial Bradbury, Danny
2008
2008 8 p. 2-
1 p.
article
6 How ready are you for the Companies Act? Gold, Steve
2008
2008 8 p. 9-11
3 p.
article
7 In Brief 2008
2008 8 p. 3-
1 p.
article
8 Internet scrambles to fix major DNS flaw 2008
2008 8 p. 3-
1 p.
article
9 McKinnon loses court appeal 2008
2008 8 p. 3-
1 p.
article
10 Paper cuts: security in non-digital written media Goucher, Wendy
2008
2008 8 p. 11-12
2 p.
article
11 The complexity of living like a snail – the dangers of the ‘fuzzy boundary’ Goucher, Wendy
2008
2008 8 p. 7-8
2 p.
article
12 TJX hackers caught 2008
2008 8 p. 1-2
2 p.
article
13 War & Peace in Cyberspace: Don't twitter away your organisation's secrets Power, Richard
2008
2008 8 p. 18-20
3 p.
article
                             13 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands