Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             21 results found
no title author magazine year volume issue page(s) type
1 An Olympic effort to secure the Games Bradbury, Danny
2010
7 1 p. 22-26
5 p.
article
2 768-bit RSA encryption cracked 2010
7 1 p. 7-
1 p.
article
3 Chinese virus writer seeks gainful work 2010
7 1 p. 9-
1 p.
article
4 Diary 2010
7 1 p. 39-
1 p.
article
5 Espionage in sport Pritchard, Stephen
2010
7 1 p. 16-18
3 p.
article
6 Garlik warns of iTunes voucher phishing scam on Facebook 2010
7 1 p. 9-
1 p.
article
7 Gary McKinnon secures a judicial review of his extradition case 2010
7 1 p. 7-
1 p.
article
8 Google – China attack episode: Is Microsoft to blame? 2010
7 1 p. 6-
1 p.
article
9 In brief 2010
7 1 p. 6-
1 p.
article
10 New wine in old bottles? Penri-Williams, Hugh
2010
7 1 p. 37-
1 p.
article
11 Read my mind Dallaway, Eleanor
2010
7 1 p. 5-
1 p.
article
12 Restoring trust Colley, John
2010
7 1 p. 36-
1 p.
article
13 Search for security Larsen, Kari
2010
7 1 p. 32-35
4 p.
article
14 Slack space 2010
7 1 p. 40-
1 p.
article
15 South Africa poised to become cybercrime hub 2010
7 1 p. 9-
1 p.
article
16 South Yorkshire police officers investigated over alleged computer misuse 2010
7 1 p. 8-
1 p.
article
17 The charmed life of cybercrime Grossman, Wendy M.
2010
7 1 p. 19-21
3 p.
article
18 UK data losses will now result in half a million pound penalties 2010
7 1 p. 7-
1 p.
article
19 What's in store for 2010? Winder, Davey
2010
7 1 p. 10-15
6 p.
article
20 Why WPA standards won't protect your network Gold, Steve
2010
7 1 p. 28-31
4 p.
article
21 2010 will be the year of the Cloud says report 2010
7 1 p. 8-
1 p.
article
                             21 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands