nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A lesson in economics
|
Colley, John |
|
2009 |
|
6 |
p. 45- 1 p. |
artikel |
2 |
Almost What it Says on the Tin
|
Sembhi, Sarb |
|
2011 |
|
6 |
p. 45- 1 p. |
artikel |
3 |
An injection of new ideas
|
Bradbury, Danny |
|
2007 |
|
6 |
p. 14-17 4 p. |
artikel |
4 |
Anti-virus: a technology update
|
Townsend, Kevin |
|
2010 |
|
6 |
p. 28-31 4 p. |
artikel |
5 |
Apple under fire over anti-phishing feature
|
|
|
2009 |
|
6 |
p. 7- 1 p. |
artikel |
6 |
Around the infosecurity block
|
Dallaway, Eleanor |
|
2007 |
|
6 |
p. 43- 1 p. |
artikel |
7 |
A Superior Education
|
Grossman, Wendy M. |
|
2011 |
|
6 |
p. 40-43 4 p. |
artikel |
8 |
Batten down the hatches
|
Brown, Tony |
|
2009 |
|
6 |
p. 43- 1 p. |
artikel |
9 |
Batten down the hatches
|
Bradbury, Danny |
|
2008 |
|
6 |
p. 26-29 4 p. |
artikel |
10 |
Best-in-class boast significant ROI for vulnerability management
|
|
|
2008 |
|
6 |
p. 8- 1 p. |
artikel |
11 |
Biometrics oversold, says Peter Cochrane
|
Booth, Nick |
|
2007 |
|
6 |
p. 7- 1 p. |
artikel |
12 |
Black Hat show coverage
|
Dallaway, Eleanor |
|
2008 |
|
6 |
p. 12-13 2 p. |
artikel |
13 |
Breaching through Congress
|
Moulds, Richard |
|
2011 |
|
6 |
p. 46- 1 p. |
artikel |
14 |
British company announces RFID ‘skimming’ prevention technology
|
|
|
2008 |
|
6 |
p. 8- 1 p. |
artikel |
15 |
Can Security and Privacy Co-exist?
|
Bradbury, Danny |
|
2011 |
|
6 |
p. 33-35 3 p. |
artikel |
16 |
Card spending research reveals UK electronic fraud hotspots
|
|
|
2009 |
|
6 |
p. 8- 1 p. |
artikel |
17 |
Chinese State of Denial
|
Amorosi, Drew |
|
2011 |
|
6 |
p. 4-7 4 p. |
artikel |
18 |
Claudia Natanson
|
Dallaway, Eleanor |
|
2010 |
|
6 |
p. 24-27 4 p. |
artikel |
19 |
Cloud computing in the spotlight
|
Stinchcombe, Neil |
|
2009 |
|
6 |
p. 30-33 4 p. |
artikel |
20 |
Compliance Strategies – A.K.A. Alphabet Soup
|
Donovan, Fred |
|
2011 |
|
6 |
p. 22-25 4 p. |
artikel |
21 |
Creating secure passwords
|
Emm, David |
|
2010 |
|
6 |
p. 36- 1 p. |
artikel |
22 |
Crime but little punishment
|
Blomfield, Symon |
|
2007 |
|
6 |
p. 13- 1 p. |
artikel |
23 |
Criminal data loss for government
|
Stringer, Rob |
|
2008 |
|
6 |
p. 11- 1 p. |
artikel |
24 |
Crisis of customer confidence
|
Colley, John |
|
2008 |
|
6 |
p. 41- 1 p. |
artikel |
25 |
Customers' bank data is going, going, gone
|
|
|
2008 |
|
6 |
p. 9- 1 p. |
artikel |
26 |
Cyberterrorism: A look into the future
|
|
|
2009 |
|
6 |
p. 34-37 4 p. |
artikel |
27 |
Danger on the drugs network
|
Knight, William |
|
2007 |
|
6 |
p. 30-32 3 p. |
artikel |
28 |
Defending the US with biometrics
|
Gray, Myra |
|
2009 |
|
6 |
p. 24-25 2 p. |
artikel |
29 |
Diary
|
|
|
2010 |
|
6 |
p. 39- 1 p. |
artikel |
30 |
Diary
|
|
|
2007 |
|
6 |
p. 47- 1 p. |
artikel |
31 |
Diary
|
|
|
2011 |
|
6 |
p. 47- 1 p. |
artikel |
32 |
Digital War
|
Dallaway, Eleanor |
|
2010 |
|
6 |
p. 5- 1 p. |
artikel |
33 |
Don’t be green
|
Mathieson, SA |
|
2007 |
|
6 |
p. 26-29 4 p. |
artikel |
34 |
Education, education, education
|
Everett, Cath |
|
2008 |
|
6 |
p. 14-18 5 p. |
artikel |
35 |
Encryption's Weakest Link
|
Pascucci, Matthew |
|
2011 |
|
6 |
p. 44- 1 p. |
artikel |
36 |
ENISA guide on network security information exchange
|
|
|
2009 |
|
6 |
p. 6- 1 p. |
artikel |
37 |
Far from Perfect
|
Chai, Ben |
|
2008 |
|
6 |
p. 36-40 5 p. |
artikel |
38 |
Going once, going twice
|
Clark, Gary |
|
2008 |
|
6 |
p. 4- 1 p. |
artikel |
39 |
Google Android security exploit made public by researcher
|
|
|
2010 |
|
6 |
p. 7- 1 p. |
artikel |
40 |
Government can't be trusted
|
Chapman, Robert |
|
2008 |
|
6 |
p. 4- 1 p. |
artikel |
41 |
Here's to your health
|
Mathieson, SA |
|
2007 |
|
6 |
p. 5- 1 p. |
artikel |
42 |
Hord Tipton
|
Dallaway, Eleanor |
|
2011 |
|
6 |
p. 11-14 4 p. |
artikel |
43 |
In brief
|
|
|
2010 |
|
6 |
p. 6- 1 p. |
artikel |
44 |
In brief
|
|
|
2008 |
|
6 |
p. 9- 1 p. |
artikel |
45 |
In brief
|
|
|
2009 |
|
6 |
p. 6- 1 p. |
artikel |
46 |
In brief
|
|
|
2007 |
|
6 |
p. 7- 1 p. |
artikel |
47 |
Infosecurity: Do You Eat Your Own Dog Food?
|
Winder, Davey |
|
2011 |
|
6 |
p. 26-29 4 p. |
artikel |
48 |
ISACA warns workers will take more risks when e-shopping in the run-up to Christmas
|
|
|
2010 |
|
6 |
p. 8- 1 p. |
artikel |
49 |
Jericho Forum at a crossroads
|
Grant, Ian |
|
2007 |
|
6 |
p. 7- 1 p. |
artikel |
50 |
Job seekers at risk of ID theft
|
|
|
2009 |
|
6 |
p. 6- 1 p. |
artikel |
51 |
Keep your data and staff safe
|
Frewin, Gordon |
|
2008 |
|
6 |
p. 4- 1 p. |
artikel |
52 |
Leaving a trace
|
Gold, Steve |
|
2008 |
|
6 |
p. 30-35 6 p. |
artikel |
53 |
License to hack
|
Knight, William |
|
2009 |
|
6 |
p. 38-41 4 p. |
artikel |
54 |
Malware hijack adds unauthorised files to Mozilla Firefox
|
|
|
2010 |
|
6 |
p. 8- 1 p. |
artikel |
55 |
Mapping Ajax's weaknesses
|
O'Neill, Mark |
|
2007 |
|
6 |
p. 38-40 3 p. |
artikel |
56 |
$2m-a-year Koobface network downed after concerted international effort
|
|
|
2010 |
|
6 |
p. 7- 1 p. |
artikel |
57 |
Moving on Up
|
Dallaway, Eleanor |
|
2011 |
|
6 |
p. 3- 1 p. |
artikel |
58 |
Not for dummies
|
Berlich, Peter |
|
2008 |
|
6 |
p. 43- 1 p. |
artikel |
59 |
Notification by right?
|
Porter, David |
|
2007 |
|
6 |
p. 13- 1 p. |
artikel |
60 |
One third of businesses failing to protect sensitive data transfers
|
|
|
2009 |
|
6 |
p. 7- 1 p. |
artikel |
61 |
Orwellian state of security
|
Larsen, Kari |
|
2009 |
|
6 |
p. 16-19 4 p. |
artikel |
62 |
Paging Doctor Compliance
|
Shein, Esther |
|
2011 |
|
6 |
p. 16-20 5 p. |
artikel |
63 |
PCI: balance required
|
Walker, John |
|
2007 |
|
6 |
p. 13- 1 p. |
artikel |
64 |
PCI update: Your guide to Version 2.0
|
Pritchard, Stephen |
|
2010 |
|
6 |
p. 18-20 3 p. |
artikel |
65 |
Phishing and the economics of e-crime
|
Moore, Tyler |
|
2007 |
|
6 |
p. 34-37 4 p. |
artikel |
66 |
Phone Hacking Scandal: Who's Getting the Message?
|
Mortleman, Jim |
|
2011 |
|
6 |
p. 36-39 4 p. |
artikel |
67 |
Piecing identity together
|
Everett, Cath |
|
2007 |
|
6 |
p. 22-25 4 p. |
artikel |
68 |
Product roundup
|
|
|
2007 |
|
6 |
p. 45-46 2 p. |
artikel |
69 |
Ray Stanton
|
Dallaway, Eleanor |
|
2010 |
|
6 |
p. 10-13 4 p. |
artikel |
70 |
Retailers exceed their credit limits
|
Dallaway, Eleanor |
|
2007 |
|
6 |
p. 8-10 3 p. |
artikel |
71 |
Revised EU privacy laws to demand greater transparency on the web
|
|
|
2010 |
|
6 |
p. 6- 1 p. |
artikel |
72 |
Royal Navy website sunk by SQL injection hacker
|
|
|
2010 |
|
6 |
p. 9- 1 p. |
artikel |
73 |
Salon of rejected artists
|
Penri-Williams, Hugh |
|
2009 |
|
6 |
p. 44- 1 p. |
artikel |
74 |
Securing the defence
|
Everett, Cath |
|
2009 |
|
6 |
p. 20-22 3 p. |
artikel |
75 |
Securing the 2012 Olympics
|
Pritchard, Stephen |
|
2009 |
|
6 |
p. 12-15 4 p. |
artikel |
76 |
Securing your home office
|
Winder, Davey |
|
2010 |
|
6 |
p. 21-23 3 p. |
artikel |
77 |
Security software spending up 4% in 2010
|
|
|
2009 |
|
6 |
p. 7- 1 p. |
artikel |
78 |
Selling biometrics to the masses
|
Townsend, Kevin |
|
2010 |
|
6 |
p. 14-17 4 p. |
artikel |
79 |
Slack space
|
|
|
2010 |
|
6 |
p. 40- 1 p. |
artikel |
80 |
Slack space
|
|
|
2009 |
|
6 |
p. 48- 1 p. |
artikel |
81 |
Slack space
|
|
|
2007 |
|
6 |
p. 48- 1 p. |
artikel |
82 |
Slack space
|
|
|
2008 |
|
6 |
p. 48- 1 p. |
artikel |
83 |
Slack Space
|
|
|
2011 |
|
6 |
p. 48- 1 p. |
artikel |
84 |
Social heroics
|
Sembhi, Sarb |
|
2010 |
|
6 |
p. 38- 1 p. |
artikel |
85 |
Spam decreasing, but social media phishing soaring says Symantec
|
|
|
2010 |
|
6 |
p. 6- 1 p. |
artikel |
86 |
Spamming the socially active
|
Knight, William |
|
2009 |
|
6 |
p. 26-29 4 p. |
artikel |
87 |
Survey indicates shift to remote network use
|
Stringer, Rob |
|
2008 |
|
6 |
p. 9- 1 p. |
artikel |
88 |
The end of the rainbow
|
Berlich, Peter |
|
2007 |
|
6 |
p. 42- 1 p. |
artikel |
89 |
The fear
|
Dallaway, Eleanor |
|
2009 |
|
6 |
p. 5- 1 p. |
artikel |
90 |
The Good, the Bad, and the Ugly Insider Threats
|
|
|
2011 |
|
6 |
p. 30-32 3 p. |
artikel |
91 |
The right to know
|
Davie, Paul |
|
2007 |
|
6 |
p. 13- 1 p. |
artikel |
92 |
The shortfall of free anti-virus
|
Bradbury, Danny |
|
2009 |
|
6 |
p. 10- 1 p. |
artikel |
93 |
Through Hell and high water
|
Knight, William |
|
2008 |
|
6 |
p. 22-25 4 p. |
artikel |
94 |
Time to make a critical switch?
|
White, Ben |
|
2008 |
|
6 |
p. 4- 1 p. |
artikel |
95 |
US accuses China Telecom of internet hijack
|
|
|
2010 |
|
6 |
p. 9- 1 p. |
artikel |
96 |
US leads Britain on e-crime punishment
|
Mathieson, SA |
|
2007 |
|
6 |
p. 6- 1 p. |
artikel |
97 |
Virtual attacks
|
Bradbury, Danny |
|
2010 |
|
6 |
p. 32-35 4 p. |
artikel |
98 |
War in the wires
|
Stringer, Rob |
|
2008 |
|
6 |
p. 10- 1 p. |
artikel |
99 |
Web applications with high risk security issues up 10%
|
|
|
2009 |
|
6 |
p. 8- 1 p. |
artikel |
100 |
When pen testers don Marigolds
|
Munro, Ken |
|
2007 |
|
6 |
p. 44- 1 p. |
artikel |
101 |
Where does the finger point?
|
Mathieson, SA |
|
2007 |
|
6 |
p. 11- 1 p. |
artikel |
102 |
Wigan council lost personal data on children and teenagers
|
|
|
2009 |
|
6 |
p. 8- 1 p. |
artikel |
103 |
Will the real cyber-criminals please stand up?
|
Pritchard, Stephen |
|
2008 |
|
6 |
p. 19-21 3 p. |
artikel |
104 |
Year of the Hack
|
Donovan, Fred |
|
2011 |
|
6 |
p. 8-10 3 p. |
artikel |
105 |
You don’t have to be stupid to work here
|
James, Mick |
|
2007 |
|
6 |
p. 18-20 3 p. |
artikel |
106 |
You're only human
|
Dallaway, Eleanor |
|
2008 |
|
6 |
p. 7- 1 p. |
artikel |