nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Automating the pen test
|
Munro, Ken |
|
2009 |
2009 |
5 |
p. 13-14 2 p. |
artikel |
2 |
Calendar
|
|
|
2009 |
2009 |
5 |
p. 20- 1 p. |
artikel |
3 |
Editorial
|
Bradbury, Danny |
|
2009 |
2009 |
5 |
p. 2- 1 p. |
artikel |
4 |
From threat to security indexing: a causal chain
|
Khan, R.A. |
|
2009 |
2009 |
5 |
p. 9-12 4 p. |
artikel |
5 |
In Brief
|
|
|
2009 |
2009 |
5 |
p. 4- 1 p. |
artikel |
6 |
Malware authors refine Google search attack
|
|
|
2009 |
2009 |
5 |
p. 3- 1 p. |
artikel |
7 |
McAfee: Infected bots on the rise
|
|
|
2009 |
2009 |
5 |
p. 2-3 2 p. |
artikel |
8 |
Security consolidation and optimisation: Gaining the most from your IT assets
|
Broom, Alastair |
|
2009 |
2009 |
5 |
p. 15-17 3 p. |
artikel |
9 |
To clear or not to clear
|
Goucher, Wendy |
|
2009 |
2009 |
5 |
p. 7-8 2 p. |
artikel |
10 |
US prepares law to increase electrical grid security
|
|
|
2009 |
2009 |
5 |
p. 1-2 2 p. |
artikel |
11 |
Visual forensics in the field
|
Forte, Dario |
|
2009 |
2009 |
5 |
p. 18-20 3 p. |
artikel |
12 |
Who is responsible for policing the internet?
|
Everett, Catherine |
|
2009 |
2009 |
5 |
p. 5-6 2 p. |
artikel |