nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fractured reaction to the Christmas bomber
|
Fisher, Neil |
|
2010 |
2010 |
2 |
p. 8- 1 p. |
artikel |
2 |
A new strategy for the protection of intellectual property
|
Gupta, Meenu |
|
2010 |
2010 |
2 |
p. 8-10 3 p. |
artikel |
3 |
Calendar
|
|
|
2010 |
2010 |
2 |
p. 20- 1 p. |
artikel |
4 |
Editorial
|
|
|
2010 |
2010 |
2 |
p. 3- 1 p. |
artikel |
5 |
Fraud 2009 bad, 2010 better?
|
Gee, Jim |
|
2010 |
2010 |
2 |
p. 13-15 3 p. |
artikel |
6 |
IE 8 reaches top browser slot
|
|
|
2010 |
2010 |
2 |
p. 3- 1 p. |
artikel |
7 |
In brief
|
|
|
2010 |
2010 |
2 |
p. 4- 1 p. |
artikel |
8 |
Software ownership: Where does it lie when it comes to M&A and outsourcing?
|
Heap, Phil |
|
2010 |
2010 |
2 |
p. 11-13 3 p. |
artikel |
9 |
The (in)consistent naming of malcode
|
Kelchner, Tom |
|
2010 |
2010 |
2 |
p. 5-7 3 p. |
artikel |
10 |
Three-dimensional incident management
|
Goucher, Wendy |
|
2010 |
2010 |
2 |
p. 16-17 2 p. |
artikel |
11 |
Top 25 software errors identified
|
|
|
2010 |
2010 |
2 |
p. 1- 1 p. |
artikel |
12 |
Trustwave: Businesses making same security mistakes
|
|
|
2010 |
2010 |
2 |
p. 2- 1 p. |
artikel |
13 |
UK police computer audit logging and control technology in the spotlight
|
Ellsmore, Tim |
|
2010 |
2010 |
2 |
p. 18-20 3 p. |
artikel |
14 |
US embarassed in cyberattack simulation
|
|
|
2010 |
2010 |
2 |
p. 2- 1 p. |
artikel |