Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             13 results found
no title author magazine year volume issue page(s) type
1 A new focus for IT security? Turner, Richard
2011
2011 2 p. 7-11
5 p.
article
2 A risky business: ISO 31000 and 27005 unwrapped Everett, Cath
2011
2011 2 p. 5-7
3 p.
article
3 Cybercrime diversifies 2011
2011 2 p. 3-
1 p.
article
4 Cyber-criminals switch to mobile platforms 2011
2011 2 p. 20-
1 p.
article
5 Editorial Mansfield-Devine, Steve
2011
2011 2 p. 2-
1 p.
article
6 Events 2011
2011 2 p. 20-
1 p.
article
7 In brief 2011
2011 2 p. 4-
1 p.
article
8 Is your organisation's data safe from prying eyes? Reich, Raphael
2011
2011 2 p. 16-18
3 p.
article
9 Private key management: best practice for the enterprise Turner, Paul
2011
2011 2 p. 18-19
2 p.
article
10 Targets of fraud need to share data 2011
2011 2 p. 20-
1 p.
article
11 The cost of compliance 2011
2011 2 p. 1-
1 p.
article
12 The human factor in espionage Sivanesan, Giri
2011
2011 2 p. 15-16
2 p.
article
13 The risk of uncertainty Goucher, Wendy
2011
2011 2 p. 11-14
4 p.
article
                             13 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands