no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A Linux-based IDPS using Snort
|
Ahmed, Ghilman |
|
2015 |
2015 |
8 |
p. 13-18 6 p. |
article |
2 |
Breaking the code of silence to build trust into business applications
|
Grimm, John |
|
2015 |
2015 |
8 |
p. 5-7 3 p. |
article |
3 |
Building better data protection with SIEM
|
Howell, David |
|
2015 |
2015 |
8 |
p. 19-20 2 p. |
article |
4 |
Darkode cybercrime forum is taken down – but is reborn just two weeks later
|
|
|
2015 |
2015 |
8 |
p. 1- 1 p. |
article |
5 |
Editorial
|
Mansfield-Devine, Steve |
|
2015 |
2015 |
8 |
p. 2- 1 p. |
article |
6 |
Events
|
|
|
2015 |
2015 |
8 |
p. 20- 1 p. |
article |
7 |
In brief
|
|
|
2015 |
2015 |
8 |
p. 4- 1 p. |
article |
8 |
Infidelity website among latest breaches
|
|
|
2015 |
2015 |
8 |
p. 3- 1 p. |
article |
9 |
Privacy policies for computer forensics
|
Halboob, Waleed |
|
2015 |
2015 |
8 |
p. 9-13 5 p. |
article |
10 |
Security breaches – hiding in plain sight
|
Kedgley, Mark |
|
2015 |
2015 |
8 |
p. 7-9 3 p. |
article |