nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new focus for IT security?
|
Turner, Richard |
|
2011 |
2011 |
2 |
p. 7-11 5 p. |
artikel |
2 |
A risky business: ISO 31000 and 27005 unwrapped
|
Everett, Cath |
|
2011 |
2011 |
2 |
p. 5-7 3 p. |
artikel |
3 |
Cybercrime diversifies
|
|
|
2011 |
2011 |
2 |
p. 3- 1 p. |
artikel |
4 |
Cyber-criminals switch to mobile platforms
|
|
|
2011 |
2011 |
2 |
p. 20- 1 p. |
artikel |
5 |
Editorial
|
Mansfield-Devine, Steve |
|
2011 |
2011 |
2 |
p. 2- 1 p. |
artikel |
6 |
Events
|
|
|
2011 |
2011 |
2 |
p. 20- 1 p. |
artikel |
7 |
In brief
|
|
|
2011 |
2011 |
2 |
p. 4- 1 p. |
artikel |
8 |
Is your organisation's data safe from prying eyes?
|
Reich, Raphael |
|
2011 |
2011 |
2 |
p. 16-18 3 p. |
artikel |
9 |
Private key management: best practice for the enterprise
|
Turner, Paul |
|
2011 |
2011 |
2 |
p. 18-19 2 p. |
artikel |
10 |
Targets of fraud need to share data
|
|
|
2011 |
2011 |
2 |
p. 20- 1 p. |
artikel |
11 |
The cost of compliance
|
|
|
2011 |
2011 |
2 |
p. 1- 1 p. |
artikel |
12 |
The human factor in espionage
|
Sivanesan, Giri |
|
2011 |
2011 |
2 |
p. 15-16 2 p. |
artikel |
13 |
The risk of uncertainty
|
Goucher, Wendy |
|
2011 |
2011 |
2 |
p. 11-14 4 p. |
artikel |