no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An Angel on your shoulder
|
Moyle, Steve |
|
2007 |
4 |
3 |
p. 36-37 2 p. |
article |
2 |
Banks need to show some common sense
|
|
|
2007 |
4 |
3 |
p. 47- 1 p. |
article |
3 |
Baronscourt Technology
|
|
|
2007 |
4 |
3 |
p. 44- 1 p. |
article |
4 |
Business continuity and availability planning
|
Bennett, John |
|
2007 |
4 |
3 |
p. 38- 1 p. |
article |
5 |
Can building ID management and security into the business infrastructure propel business success?
|
Powley, Des |
|
2007 |
4 |
3 |
p. 39- 1 p. |
article |
6 |
CheckPoint
|
|
|
2007 |
4 |
3 |
p. 44- 1 p. |
article |
7 |
Costly hammer cracks tiny nut
|
Grant, Ian |
|
2007 |
4 |
3 |
p. 6-7 2 p. |
article |
8 |
Cover your back security: always one step behind
|
Dallaway, Eleanor |
|
2007 |
4 |
3 |
p. 8-9 2 p. |
article |
9 |
Cyber-Ark
|
|
|
2007 |
4 |
3 |
p. 44- 1 p. |
article |
10 |
Defending your organization against the new generation of Web-based hybrid
|
Ben-Itzhak, Yuval |
|
2007 |
4 |
3 |
p. 42-43 2 p. |
article |
11 |
DigitalPersona
|
|
|
2007 |
4 |
3 |
p. 44- 1 p. |
article |
12 |
Discover Hackistan and, er, live…
|
|
|
2007 |
4 |
3 |
p. 47- 1 p. |
article |
13 |
Encryption is the new postman
|
Dallaway, Eleanor |
|
2007 |
4 |
3 |
p. 8- 1 p. |
article |
14 |
Fighting over keeping hackers in check
|
Knight, William |
|
2007 |
4 |
3 |
p. 22-25 4 p. |
article |
15 |
Finjan
|
|
|
2007 |
4 |
3 |
p. 44- 1 p. |
article |
16 |
In brief
|
|
|
2007 |
4 |
3 |
p. 7- 1 p. |
article |
17 |
Increased collaboration between companies set to ignite new security market
|
McKenna, Brian |
|
2007 |
4 |
3 |
p. 9- 1 p. |
article |
18 |
Legislation at war
|
Mathieson, SA |
|
2007 |
4 |
3 |
p. 26-28 3 p. |
article |
19 |
Marshal
|
|
|
2007 |
4 |
3 |
p. 44- 1 p. |
article |
20 |
Microsoft
|
|
|
2007 |
4 |
3 |
p. 46- 1 p. |
article |
21 |
MXI
|
|
|
2007 |
4 |
3 |
p. 46- 1 p. |
article |
22 |
Online top 20: data captured using kaspersky lab'S online scanner
|
|
|
2007 |
4 |
3 |
p. 10- 1 p. |
article |
23 |
Pointsec
|
|
|
2007 |
4 |
3 |
p. 46- 1 p. |
article |
24 |
Police continent
|
Grant, Ian |
|
2007 |
4 |
3 |
p. 7-8 2 p. |
article |
25 |
Rear view mirror
|
Grant, Ian |
|
2007 |
4 |
3 |
p. 18-21 4 p. |
article |
26 |
Room for growth in an over-crowded space?
|
Everett, Cath |
|
2007 |
4 |
3 |
p. 29-31 3 p. |
article |
27 |
Secure at a distance
|
Everett, Cath |
|
2007 |
4 |
3 |
p. 16-17 2 p. |
article |
28 |
Security professionals need to improve people (and business) management skills before IT skills
|
Colley, John |
|
2007 |
4 |
3 |
p. 40-41 2 p. |
article |
29 |
Sophos
|
|
|
2007 |
4 |
3 |
p. 46- 1 p. |
article |
30 |
S.P.I. Dynamics
|
|
|
2007 |
4 |
3 |
p. 46- 1 p. |
article |
31 |
The DNA of infosecurity
|
McKenna, Brian |
|
2007 |
4 |
3 |
p. 5- 1 p. |
article |
32 |
Tightening the purse strings on security
|
Condon, Ron |
|
2007 |
4 |
3 |
p. 12- 1 p. |
article |
33 |
Top brands targeted by phishing SCAMS: Source: Mcafee
|
|
|
2007 |
4 |
3 |
p. 10- 1 p. |
article |
34 |
Tumbleweed
|
|
|
2007 |
4 |
3 |
p. 46- 1 p. |
article |
35 |
VoIP - soon to be under attack?
|
Mathieson, SA |
|
2007 |
4 |
3 |
p. 9- 1 p. |
article |
36 |
Windows 'Vista in a Nutshell' rush-released
|
|
|
2007 |
4 |
3 |
p. 47- 1 p. |
article |
37 |
ZigBee: A long way to go?
|
Mišic, Jelena |
|
2007 |
4 |
3 |
p. 32-35 4 p. |
article |