Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             71 results found
no title author magazine year volume issue page(s) type
1 A diet that will send you bananas Cremonini, Marco
2008
7 p. 46-
1 p.
article
2 A fluid identity Cremonini, Marco
2007
7 p. 43-
1 p.
article
3 A history of security spending Mathieson, SA
2007
7 p. 5-
1 p.
article
4 A messy but worthy read Cremonini, Marco
2009
7 p. 45-
1 p.
article
5 Anatomy of a CISO Winder, Davey
2009
7 p. 24-26
3 p.
article
6 An industry born of necessity Dallaway, Eleanor
2007
7 p. 18-20
3 p.
article
7 A smart phone? Knight, William
2009
7 p. 32-35
4 p.
article
8 Awareness training 2.0 McKenna, Brian
2009
7 p. 18-20
3 p.
article
9 Biometric ID card due for release 2008
7 p. 10-
1 p.
article
10 Biometrics Conference 2009 show coverage 2009
7 p. 10-
1 p.
article
11 CFET 2007, Canterbury, UK, 6–7 september Edgar-Nevill, Denis
2007
7 p. 12-13
2 p.
article
12 Companies need policing and tighter policies Miller, Greg
2007
7 p. 15-
1 p.
article
13 Complying to a false sense of security Grossman, Wendy M.
2008
7 p. 24-27
4 p.
article
14 Cryptography set to enter its prime Stringer, Rob
2008
7 p. 8-
1 p.
article
15 Data angels needed Clark, Gary
2008
7 p. 4-
1 p.
article
16 Diary 2009
7 p. 47-
1 p.
article
17 Double jeopardy James, Mick
2007
7 p. 28-30
3 p.
article
18 Email treasure chest Yearwood, Ken
2009
7 p. 40-
1 p.
article
19 Face-off in Oxford Mathieson, SA
2007
7 p. 32-35
4 p.
article
20 2FA comes of age Abraham, Dave
2009
7 p. 44-
1 p.
article
21 Fake virus, worm and malware alerts target online shoppers 2009
7 p. 6-
1 p.
article
22 Gartner IT security summit, London, 17-19 september Mathieson, SA
2007
7 p. 8-
1 p.
article
23 German firm develops world's first “Trojan-proof” password system Gold, Steve
2008
7 p. 8-
1 p.
article
24 Google calls for world-wide privacy standard Mathieson, SA
2007
7 p. 6-
1 p.
article
25 Hackers exploit Tiger Woods' car accident 2009
7 p. 7-
1 p.
article
26 Health staff view ‘secure’ celebrity record Collins, Tony
2007
7 p. 7-
1 p.
article
27 HSBC develops new authentication system Thomson, Rebecca
2007
7 p. 7-
1 p.
article
28 ICO to make data protection compliance easier 2009
7 p. 8-
1 p.
article
29 Inattention heightens IT risks 2007
7 p. 9-
1 p.
article
30 In Brief 2009
7 p. 6-
1 p.
article
31 In brief 2007
7 p. 7-
1 p.
article
32 In Brief 2008
7 p. 9-
1 p.
article
33 Information security executive of the year United Kingdom and Ireland award Dallaway, Eleanor
2007
7 p. 16-17
2 p.
article
34 (ISC)2 rolls out two new courses for information security professionals Stringer, Rob
2008
7 p. 12-13
2 p.
article
35 ISSE/Secure 2007, warsaw, Poland, 25–27 september Dallaway, Eleanor
2007
7 p. 10-
1 p.
article
36 Lumension sticks to specialisation Mathieson, SA
2007
7 p. 6-
1 p.
article
37 Manufacturing IP Securely Sterlicchi, John
2008
7 p. 31-33
3 p.
article
38 McKinnon may get judicial review of case 2009
7 p. 6-
1 p.
article
39 Microsoft denies security patch causes Windows 7 black screen problems 2009
7 p. 7-
1 p.
article
40 More than meets the eye Gold, Steve
2008
7 p. 38-41
4 p.
article
41 Only human Cater, Nick
2008
7 p. 4-
1 p.
article
42 Preserving Bletchley Park Berlich, Peter
2009
7 p. 28-31
4 p.
article
43 Product roundup 2007
7 p. 45-46
2 p.
article
44 Protecting what matters Bradbury, Danny
2008
7 p. 34-37
4 p.
article
45 ROI more important than ever Dodt, Ansgar
2008
7 p. 4-
1 p.
article
46 RSA Conference Europe 2009 show coverage 2009
7 p. 12-13
2 p.
article
47 Secure software may be decades away 2007
7 p. 8-
1 p.
article
48 Security holds back cloud adoption 2009
7 p. 6-
1 p.
article
49 Simply the best Dallaway, Eleanor
2008
7 p. 7-
1 p.
article
50 Slack space 2009
7 p. 48-
1 p.
article
51 Slack space 2007
7 p. 48-
1 p.
article
52 Slack space 2008
7 p. 48-
1 p.
article
53 Something missing Hacker, David
2008
7 p. 4-
1 p.
article
54 Strokes of genius? Evans, Steve
2007
7 p. 15-
1 p.
article
55 Talking about a revolution Lacey, David
2008
7 p. 28-30
3 p.
article
56 Telcos should prepare for retention Brewer, Ross
2007
7 p. 15-
1 p.
article
57 The economics of cybercrime Chai, Ben
2009
7 p. 36-39
4 p.
article
58 The politics of storing official data Grossman, Wendy M.
2009
7 p. 21-23
3 p.
article
59 The re-inventing Valley Dallaway, Eleanor
2008
7 p. 14-18
5 p.
article
60 To boldly make the quantum leap Woodward, Alan
2007
7 p. 40-42
3 p.
article
61 Two TJX hackers plead guilty 2008
7 p. 10-
1 p.
article
62 Two worlds no longer apart Walters, Richard
2009
7 p. 43-
1 p.
article
63 Under Pressure Dallaway, Eleanor
2009
7 p. 5-
1 p.
article
64 US donates to British code-cracking history Stringer, Rob
2008
7 p. 9-
1 p.
article
65 WebAlert to warn companies of infected websites Stringer, Rob
2008
7 p. 10-
1 p.
article
66 We’ve been expecting you, Mr Bond Condon, Ron
2007
7 p. 26-27
2 p.
article
67 When security meets law Moretti, Alessandro
2008
7 p. 45-
1 p.
article
68 When two become one 2008
7 p. 20-23
4 p.
article
69 Who do you think you are? Everett, Cath
2009
7 p. 14-17
4 p.
article
70 Windows autorun trojan tops November malware chart 2009
7 p. 8-
1 p.
article
71 Zero-day, but not zero-risk Everett, Cath
2007
7 p. 36-39
4 p.
article
                             71 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands