nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Olympic effort to secure the Games
|
Bradbury, Danny |
|
2010 |
7 |
1 |
p. 22-26 5 p. |
artikel |
2 |
768-bit RSA encryption cracked
|
|
|
2010 |
7 |
1 |
p. 7- 1 p. |
artikel |
3 |
Chinese virus writer seeks gainful work
|
|
|
2010 |
7 |
1 |
p. 9- 1 p. |
artikel |
4 |
Diary
|
|
|
2010 |
7 |
1 |
p. 39- 1 p. |
artikel |
5 |
Espionage in sport
|
Pritchard, Stephen |
|
2010 |
7 |
1 |
p. 16-18 3 p. |
artikel |
6 |
Garlik warns of iTunes voucher phishing scam on Facebook
|
|
|
2010 |
7 |
1 |
p. 9- 1 p. |
artikel |
7 |
Gary McKinnon secures a judicial review of his extradition case
|
|
|
2010 |
7 |
1 |
p. 7- 1 p. |
artikel |
8 |
Google – China attack episode: Is Microsoft to blame?
|
|
|
2010 |
7 |
1 |
p. 6- 1 p. |
artikel |
9 |
In brief
|
|
|
2010 |
7 |
1 |
p. 6- 1 p. |
artikel |
10 |
New wine in old bottles?
|
Penri-Williams, Hugh |
|
2010 |
7 |
1 |
p. 37- 1 p. |
artikel |
11 |
Read my mind
|
Dallaway, Eleanor |
|
2010 |
7 |
1 |
p. 5- 1 p. |
artikel |
12 |
Restoring trust
|
Colley, John |
|
2010 |
7 |
1 |
p. 36- 1 p. |
artikel |
13 |
Search for security
|
Larsen, Kari |
|
2010 |
7 |
1 |
p. 32-35 4 p. |
artikel |
14 |
Slack space
|
|
|
2010 |
7 |
1 |
p. 40- 1 p. |
artikel |
15 |
South Africa poised to become cybercrime hub
|
|
|
2010 |
7 |
1 |
p. 9- 1 p. |
artikel |
16 |
South Yorkshire police officers investigated over alleged computer misuse
|
|
|
2010 |
7 |
1 |
p. 8- 1 p. |
artikel |
17 |
The charmed life of cybercrime
|
Grossman, Wendy M. |
|
2010 |
7 |
1 |
p. 19-21 3 p. |
artikel |
18 |
UK data losses will now result in half a million pound penalties
|
|
|
2010 |
7 |
1 |
p. 7- 1 p. |
artikel |
19 |
What's in store for 2010?
|
Winder, Davey |
|
2010 |
7 |
1 |
p. 10-15 6 p. |
artikel |
20 |
Why WPA standards won't protect your network
|
Gold, Steve |
|
2010 |
7 |
1 |
p. 28-31 4 p. |
artikel |
21 |
2010 will be the year of the Cloud says report
|
|
|
2010 |
7 |
1 |
p. 8- 1 p. |
artikel |