nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An introduction to Continuous Controls Monitoring
|
Hunt, Richard |
|
2010 |
2010 |
6 |
p. 16-19 4 p. |
artikel |
2 |
Anti-malware vendors slow to respond
|
|
|
2010 |
2010 |
6 |
p. 1-2 2 p. |
artikel |
3 |
Calendar
|
|
|
2010 |
2010 |
6 |
p. 20- 1 p. |
artikel |
4 |
Editorial
|
|
|
2010 |
2010 |
6 |
p. 2- 1 p. |
artikel |
5 |
Google wifi snooping attracts investigations
|
|
|
2010 |
2010 |
6 |
p. 2-3 2 p. |
artikel |
6 |
Growing malware menace for mobiles
|
|
|
2010 |
2010 |
6 |
p. 19-20 2 p. |
artikel |
7 |
In brief
|
|
|
2010 |
2010 |
6 |
p. 4- 1 p. |
artikel |
8 |
Jumping security hurdles
|
Furnell, Steven |
|
2010 |
2010 |
6 |
p. 10-14 5 p. |
artikel |
9 |
Mass attack on websites
|
|
|
2010 |
2010 |
6 |
p. 20- 1 p. |
artikel |
10 |
More Mac malware
|
|
|
2010 |
2010 |
6 |
p. 3- 1 p. |
artikel |
11 |
Put your trust in people
|
|
|
2010 |
2010 |
6 |
p. 20- 1 p. |
artikel |
12 |
Social media: opportunity or risk?
|
Everett, Catherine |
|
2010 |
2010 |
6 |
p. 8-10 3 p. |
artikel |
13 |
The state of phishing
|
Aaron, Greg |
|
2010 |
2010 |
6 |
p. 5-8 4 p. |
artikel |
14 |
The year of the cloud
|
Stanton, Ray |
|
2010 |
2010 |
6 |
p. 14-16 3 p. |
artikel |