| no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
| 1 |
Calendar
|
|
|
2012 |
2012 |
6 |
p. 20- 1 p. |
article |
| 2 |
Challenges in PII data protection
|
Rozenberg, Yigal |
|
2012 |
2012 |
6 |
p. 5-9 5 p. |
article |
| 3 |
Commercial use of Facebook and Twitter – risks and rewards
|
Hutchings, Chris |
|
2012 |
2012 |
6 |
p. 19-20 2 p. |
article |
| 4 |
Cyber crimes: preparing to fight insider threats
|
Lee, Marc |
|
2012 |
2012 |
6 |
p. 14-15 2 p. |
article |
| 5 |
Disguising the dangers: hiding attacks behind modern masks
|
Furnell, Steven |
|
2012 |
2012 |
6 |
p. 9-13 5 p. |
article |
| 6 |
Dissecting a hacktivist attack
|
|
|
2012 |
2012 |
6 |
p. 3- 1 p. |
article |
| 7 |
Editorial
|
Mansfield-Devine, Steve |
|
2012 |
2012 |
6 |
p. 2- 1 p. |
article |
| 8 |
In brief
|
|
|
2012 |
2012 |
6 |
p. 4- 1 p. |
article |
| 9 |
Interview: Philip Lieberman and the human factor
|
Mansfield-Devine, Steve |
|
2012 |
2012 |
6 |
p. 15-18 4 p. |
article |
| 10 |
Password hacks show major sites are vulnerable
|
|
|
2012 |
2012 |
6 |
p. 1- 1 p. |
article |