no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An Olympic effort to secure the Games
|
Bradbury, Danny |
|
2010 |
7 |
1 |
p. 22-26 5 p. |
article |
2 |
768-bit RSA encryption cracked
|
|
|
2010 |
7 |
1 |
p. 7- 1 p. |
article |
3 |
Chinese virus writer seeks gainful work
|
|
|
2010 |
7 |
1 |
p. 9- 1 p. |
article |
4 |
Diary
|
|
|
2010 |
7 |
1 |
p. 39- 1 p. |
article |
5 |
Espionage in sport
|
Pritchard, Stephen |
|
2010 |
7 |
1 |
p. 16-18 3 p. |
article |
6 |
Garlik warns of iTunes voucher phishing scam on Facebook
|
|
|
2010 |
7 |
1 |
p. 9- 1 p. |
article |
7 |
Gary McKinnon secures a judicial review of his extradition case
|
|
|
2010 |
7 |
1 |
p. 7- 1 p. |
article |
8 |
Google – China attack episode: Is Microsoft to blame?
|
|
|
2010 |
7 |
1 |
p. 6- 1 p. |
article |
9 |
In brief
|
|
|
2010 |
7 |
1 |
p. 6- 1 p. |
article |
10 |
New wine in old bottles?
|
Penri-Williams, Hugh |
|
2010 |
7 |
1 |
p. 37- 1 p. |
article |
11 |
Read my mind
|
Dallaway, Eleanor |
|
2010 |
7 |
1 |
p. 5- 1 p. |
article |
12 |
Restoring trust
|
Colley, John |
|
2010 |
7 |
1 |
p. 36- 1 p. |
article |
13 |
Search for security
|
Larsen, Kari |
|
2010 |
7 |
1 |
p. 32-35 4 p. |
article |
14 |
Slack space
|
|
|
2010 |
7 |
1 |
p. 40- 1 p. |
article |
15 |
South Africa poised to become cybercrime hub
|
|
|
2010 |
7 |
1 |
p. 9- 1 p. |
article |
16 |
South Yorkshire police officers investigated over alleged computer misuse
|
|
|
2010 |
7 |
1 |
p. 8- 1 p. |
article |
17 |
The charmed life of cybercrime
|
Grossman, Wendy M. |
|
2010 |
7 |
1 |
p. 19-21 3 p. |
article |
18 |
UK data losses will now result in half a million pound penalties
|
|
|
2010 |
7 |
1 |
p. 7- 1 p. |
article |
19 |
What's in store for 2010?
|
Winder, Davey |
|
2010 |
7 |
1 |
p. 10-15 6 p. |
article |
20 |
Why WPA standards won't protect your network
|
Gold, Steve |
|
2010 |
7 |
1 |
p. 28-31 4 p. |
article |
21 |
2010 will be the year of the Cloud says report
|
|
|
2010 |
7 |
1 |
p. 8- 1 p. |
article |