Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             106 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A lesson in economics Colley, John
2009
6 p. 45-
1 p.
artikel
2 Almost What it Says on the Tin Sembhi, Sarb
2011
6 p. 45-
1 p.
artikel
3 An injection of new ideas Bradbury, Danny
2007
6 p. 14-17
4 p.
artikel
4 Anti-virus: a technology update Townsend, Kevin
2010
6 p. 28-31
4 p.
artikel
5 Apple under fire over anti-phishing feature 2009
6 p. 7-
1 p.
artikel
6 Around the infosecurity block Dallaway, Eleanor
2007
6 p. 43-
1 p.
artikel
7 A Superior Education Grossman, Wendy M.
2011
6 p. 40-43
4 p.
artikel
8 Batten down the hatches Brown, Tony
2009
6 p. 43-
1 p.
artikel
9 Batten down the hatches Bradbury, Danny
2008
6 p. 26-29
4 p.
artikel
10 Best-in-class boast significant ROI for vulnerability management 2008
6 p. 8-
1 p.
artikel
11 Biometrics oversold, says Peter Cochrane Booth, Nick
2007
6 p. 7-
1 p.
artikel
12 Black Hat show coverage Dallaway, Eleanor
2008
6 p. 12-13
2 p.
artikel
13 Breaching through Congress Moulds, Richard
2011
6 p. 46-
1 p.
artikel
14 British company announces RFID ‘skimming’ prevention technology 2008
6 p. 8-
1 p.
artikel
15 Can Security and Privacy Co-exist? Bradbury, Danny
2011
6 p. 33-35
3 p.
artikel
16 Card spending research reveals UK electronic fraud hotspots 2009
6 p. 8-
1 p.
artikel
17 Chinese State of Denial Amorosi, Drew
2011
6 p. 4-7
4 p.
artikel
18 Claudia Natanson Dallaway, Eleanor
2010
6 p. 24-27
4 p.
artikel
19 Cloud computing in the spotlight Stinchcombe, Neil
2009
6 p. 30-33
4 p.
artikel
20 Compliance Strategies – A.K.A. Alphabet Soup Donovan, Fred
2011
6 p. 22-25
4 p.
artikel
21 Creating secure passwords Emm, David
2010
6 p. 36-
1 p.
artikel
22 Crime but little punishment Blomfield, Symon
2007
6 p. 13-
1 p.
artikel
23 Criminal data loss for government Stringer, Rob
2008
6 p. 11-
1 p.
artikel
24 Crisis of customer confidence Colley, John
2008
6 p. 41-
1 p.
artikel
25 Customers' bank data is going, going, gone 2008
6 p. 9-
1 p.
artikel
26 Cyberterrorism: A look into the future 2009
6 p. 34-37
4 p.
artikel
27 Danger on the drugs network Knight, William
2007
6 p. 30-32
3 p.
artikel
28 Defending the US with biometrics Gray, Myra
2009
6 p. 24-25
2 p.
artikel
29 Diary 2010
6 p. 39-
1 p.
artikel
30 Diary 2007
6 p. 47-
1 p.
artikel
31 Diary 2011
6 p. 47-
1 p.
artikel
32 Digital War Dallaway, Eleanor
2010
6 p. 5-
1 p.
artikel
33 Don’t be green Mathieson, SA
2007
6 p. 26-29
4 p.
artikel
34 Education, education, education Everett, Cath
2008
6 p. 14-18
5 p.
artikel
35 Encryption's Weakest Link Pascucci, Matthew
2011
6 p. 44-
1 p.
artikel
36 ENISA guide on network security information exchange 2009
6 p. 6-
1 p.
artikel
37 Far from Perfect Chai, Ben
2008
6 p. 36-40
5 p.
artikel
38 Going once, going twice Clark, Gary
2008
6 p. 4-
1 p.
artikel
39 Google Android security exploit made public by researcher 2010
6 p. 7-
1 p.
artikel
40 Government can't be trusted Chapman, Robert
2008
6 p. 4-
1 p.
artikel
41 Here's to your health Mathieson, SA
2007
6 p. 5-
1 p.
artikel
42 Hord Tipton Dallaway, Eleanor
2011
6 p. 11-14
4 p.
artikel
43 In brief 2010
6 p. 6-
1 p.
artikel
44 In brief 2008
6 p. 9-
1 p.
artikel
45 In brief 2009
6 p. 6-
1 p.
artikel
46 In brief 2007
6 p. 7-
1 p.
artikel
47 Infosecurity: Do You Eat Your Own Dog Food? Winder, Davey
2011
6 p. 26-29
4 p.
artikel
48 ISACA warns workers will take more risks when e-shopping in the run-up to Christmas 2010
6 p. 8-
1 p.
artikel
49 Jericho Forum at a crossroads Grant, Ian
2007
6 p. 7-
1 p.
artikel
50 Job seekers at risk of ID theft 2009
6 p. 6-
1 p.
artikel
51 Keep your data and staff safe Frewin, Gordon
2008
6 p. 4-
1 p.
artikel
52 Leaving a trace Gold, Steve
2008
6 p. 30-35
6 p.
artikel
53 License to hack Knight, William
2009
6 p. 38-41
4 p.
artikel
54 Malware hijack adds unauthorised files to Mozilla Firefox 2010
6 p. 8-
1 p.
artikel
55 Mapping Ajax's weaknesses O'Neill, Mark
2007
6 p. 38-40
3 p.
artikel
56 $2m-a-year Koobface network downed after concerted international effort 2010
6 p. 7-
1 p.
artikel
57 Moving on Up Dallaway, Eleanor
2011
6 p. 3-
1 p.
artikel
58 Not for dummies Berlich, Peter
2008
6 p. 43-
1 p.
artikel
59 Notification by right? Porter, David
2007
6 p. 13-
1 p.
artikel
60 One third of businesses failing to protect sensitive data transfers 2009
6 p. 7-
1 p.
artikel
61 Orwellian state of security Larsen, Kari
2009
6 p. 16-19
4 p.
artikel
62 Paging Doctor Compliance Shein, Esther
2011
6 p. 16-20
5 p.
artikel
63 PCI: balance required Walker, John
2007
6 p. 13-
1 p.
artikel
64 PCI update: Your guide to Version 2.0 Pritchard, Stephen
2010
6 p. 18-20
3 p.
artikel
65 Phishing and the economics of e-crime Moore, Tyler
2007
6 p. 34-37
4 p.
artikel
66 Phone Hacking Scandal: Who's Getting the Message? Mortleman, Jim
2011
6 p. 36-39
4 p.
artikel
67 Piecing identity together Everett, Cath
2007
6 p. 22-25
4 p.
artikel
68 Product roundup 2007
6 p. 45-46
2 p.
artikel
69 Ray Stanton Dallaway, Eleanor
2010
6 p. 10-13
4 p.
artikel
70 Retailers exceed their credit limits Dallaway, Eleanor
2007
6 p. 8-10
3 p.
artikel
71 Revised EU privacy laws to demand greater transparency on the web 2010
6 p. 6-
1 p.
artikel
72 Royal Navy website sunk by SQL injection hacker 2010
6 p. 9-
1 p.
artikel
73 Salon of rejected artists Penri-Williams, Hugh
2009
6 p. 44-
1 p.
artikel
74 Securing the defence Everett, Cath
2009
6 p. 20-22
3 p.
artikel
75 Securing the 2012 Olympics Pritchard, Stephen
2009
6 p. 12-15
4 p.
artikel
76 Securing your home office Winder, Davey
2010
6 p. 21-23
3 p.
artikel
77 Security software spending up 4% in 2010 2009
6 p. 7-
1 p.
artikel
78 Selling biometrics to the masses Townsend, Kevin
2010
6 p. 14-17
4 p.
artikel
79 Slack space 2010
6 p. 40-
1 p.
artikel
80 Slack space 2009
6 p. 48-
1 p.
artikel
81 Slack space 2007
6 p. 48-
1 p.
artikel
82 Slack space 2008
6 p. 48-
1 p.
artikel
83 Slack Space 2011
6 p. 48-
1 p.
artikel
84 Social heroics Sembhi, Sarb
2010
6 p. 38-
1 p.
artikel
85 Spam decreasing, but social media phishing soaring says Symantec 2010
6 p. 6-
1 p.
artikel
86 Spamming the socially active Knight, William
2009
6 p. 26-29
4 p.
artikel
87 Survey indicates shift to remote network use Stringer, Rob
2008
6 p. 9-
1 p.
artikel
88 The end of the rainbow Berlich, Peter
2007
6 p. 42-
1 p.
artikel
89 The fear Dallaway, Eleanor
2009
6 p. 5-
1 p.
artikel
90 The Good, the Bad, and the Ugly Insider Threats 2011
6 p. 30-32
3 p.
artikel
91 The right to know Davie, Paul
2007
6 p. 13-
1 p.
artikel
92 The shortfall of free anti-virus Bradbury, Danny
2009
6 p. 10-
1 p.
artikel
93 Through Hell and high water Knight, William
2008
6 p. 22-25
4 p.
artikel
94 Time to make a critical switch? White, Ben
2008
6 p. 4-
1 p.
artikel
95 US accuses China Telecom of internet hijack 2010
6 p. 9-
1 p.
artikel
96 US leads Britain on e-crime punishment Mathieson, SA
2007
6 p. 6-
1 p.
artikel
97 Virtual attacks Bradbury, Danny
2010
6 p. 32-35
4 p.
artikel
98 War in the wires Stringer, Rob
2008
6 p. 10-
1 p.
artikel
99 Web applications with high risk security issues up 10% 2009
6 p. 8-
1 p.
artikel
100 When pen testers don Marigolds Munro, Ken
2007
6 p. 44-
1 p.
artikel
101 Where does the finger point? Mathieson, SA
2007
6 p. 11-
1 p.
artikel
102 Wigan council lost personal data on children and teenagers 2009
6 p. 8-
1 p.
artikel
103 Will the real cyber-criminals please stand up? Pritchard, Stephen
2008
6 p. 19-21
3 p.
artikel
104 Year of the Hack Donovan, Fred
2011
6 p. 8-10
3 p.
artikel
105 You don’t have to be stupid to work here James, Mick
2007
6 p. 18-20
3 p.
artikel
106 You're only human Dallaway, Eleanor
2008
6 p. 7-
1 p.
artikel
                             106 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland