Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             10 results found
no title author magazine year volume issue page(s) type
1 A Linux-based IDPS using Snort Ahmed, Ghilman
2015
2015 8 p. 13-18
6 p.
article
2 Breaking the code of silence to build trust into business applications Grimm, John
2015
2015 8 p. 5-7
3 p.
article
3 Building better data protection with SIEM Howell, David
2015
2015 8 p. 19-20
2 p.
article
4 Darkode cybercrime forum is taken down – but is reborn just two weeks later 2015
2015 8 p. 1-
1 p.
article
5 Editorial Mansfield-Devine, Steve
2015
2015 8 p. 2-
1 p.
article
6 Events 2015
2015 8 p. 20-
1 p.
article
7 In brief 2015
2015 8 p. 4-
1 p.
article
8 Infidelity website among latest breaches 2015
2015 8 p. 3-
1 p.
article
9 Privacy policies for computer forensics Halboob, Waleed
2015
2015 8 p. 9-13
5 p.
article
10 Security breaches – hiding in plain sight Kedgley, Mark
2015
2015 8 p. 7-9
3 p.
article
                             10 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands