nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A map, not a seatbelt
|
Cremonini, Marco |
|
2010 |
7 |
4 |
p. 36- 1 p. |
artikel |
2 |
Apple iPhone 4 hacked in a day
|
|
|
2010 |
7 |
4 |
p. 6- 1 p. |
artikel |
3 |
Canon warns of digital printer security issue
|
|
|
2010 |
7 |
4 |
p. 7- 1 p. |
artikel |
4 |
Criminal hackers less competent than 10 years ago
|
|
|
2010 |
7 |
4 |
p. 9- 1 p. |
artikel |
5 |
Diary
|
|
|
2010 |
7 |
4 |
p. 39- 1 p. |
artikel |
6 |
Dick Williams
|
Dallaway, Eleanor |
|
2010 |
7 |
4 |
p. 12-15 4 p. |
artikel |
7 |
Does Web 2.0 need security 2.0?
|
Winder, Davey |
|
2010 |
7 |
4 |
p. 18-21 4 p. |
artikel |
8 |
Google responds to report on Android security
|
|
|
2010 |
7 |
4 |
p. 8- 1 p. |
artikel |
9 |
Google's approach on Microsoft zero-day is questionable
|
|
|
2010 |
7 |
4 |
p. 8- 1 p. |
artikel |
10 |
How not to spend your infosec budget
|
Grossman, Wendy M. |
|
2010 |
7 |
4 |
p. 22-24 3 p. |
artikel |
11 |
In brief
|
|
|
2010 |
7 |
4 |
p. 6- 1 p. |
artikel |
12 |
India beats Netherlands, Brazil and Germany in security world cup
|
|
|
2010 |
7 |
4 |
p. 6- 1 p. |
artikel |
13 |
ISACA identifies top five social media risks for business
|
|
|
2010 |
7 |
4 |
p. 8- 1 p. |
artikel |
14 |
360°IT: Examine IT security within a wider business perspective
|
Stinchcombe, Neil |
|
2010 |
7 |
4 |
p. 16-17 2 p. |
artikel |
15 |
Laptop thefts to soar this summer
|
|
|
2010 |
7 |
4 |
p. 10- 1 p. |
artikel |
16 |
Mobile malware is a reality says Kaspersky
|
|
|
2010 |
7 |
4 |
p. 11- 1 p. |
artikel |
17 |
New PCI DSS hurdles loom
|
|
|
2010 |
7 |
4 |
p. 9- 1 p. |
artikel |
18 |
Newspaper reveals how your Apple iPhone spies on you
|
|
|
2010 |
7 |
4 |
p. 7- 1 p. |
artikel |
19 |
50% of IT professionals using unencrypted USBs
|
|
|
2010 |
7 |
4 |
p. 10- 1 p. |
artikel |
20 |
Power to the people
|
Dallaway, Eleanor |
|
2010 |
7 |
4 |
p. 5- 1 p. |
artikel |
21 |
Read all about it
|
Bradbury, Danny |
|
2010 |
7 |
4 |
p. 29-31 3 p. |
artikel |
22 |
Shopping for security: Securing the e-tail market
|
Everett, Cath |
|
2010 |
7 |
4 |
p. 26-28 3 p. |
artikel |
23 |
Slack space
|
|
|
2010 |
7 |
4 |
p. 40- 1 p. |
artikel |
24 |
Spanish internet users hit by wave of e-banking trojans
|
|
|
2010 |
7 |
4 |
p. 10- 1 p. |
artikel |
25 |
The art of social engineering
|
Townsend, Kevin |
|
2010 |
7 |
4 |
p. 32-35 4 p. |
artikel |
26 |
The changing role of security
|
Blackhurst, Martin |
|
2010 |
7 |
4 |
p. 37- 1 p. |
artikel |