nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Almost What it Says on the Tin
|
Sembhi, Sarb |
|
2011 |
8 |
6 |
p. 45- 1 p. |
artikel |
2 |
A Superior Education
|
Grossman, Wendy M. |
|
2011 |
8 |
6 |
p. 40-43 4 p. |
artikel |
3 |
Breaching through Congress
|
Moulds, Richard |
|
2011 |
8 |
6 |
p. 46- 1 p. |
artikel |
4 |
Can Security and Privacy Co-exist?
|
Bradbury, Danny |
|
2011 |
8 |
6 |
p. 33-35 3 p. |
artikel |
5 |
Chinese State of Denial
|
Amorosi, Drew |
|
2011 |
8 |
6 |
p. 4-7 4 p. |
artikel |
6 |
Compliance Strategies – A.K.A. Alphabet Soup
|
Donovan, Fred |
|
2011 |
8 |
6 |
p. 22-25 4 p. |
artikel |
7 |
Diary
|
|
|
2011 |
8 |
6 |
p. 47- 1 p. |
artikel |
8 |
Encryption's Weakest Link
|
Pascucci, Matthew |
|
2011 |
8 |
6 |
p. 44- 1 p. |
artikel |
9 |
Hord Tipton
|
Dallaway, Eleanor |
|
2011 |
8 |
6 |
p. 11-14 4 p. |
artikel |
10 |
Infosecurity: Do You Eat Your Own Dog Food?
|
Winder, Davey |
|
2011 |
8 |
6 |
p. 26-29 4 p. |
artikel |
11 |
Moving on Up
|
Dallaway, Eleanor |
|
2011 |
8 |
6 |
p. 3- 1 p. |
artikel |
12 |
Paging Doctor Compliance
|
Shein, Esther |
|
2011 |
8 |
6 |
p. 16-20 5 p. |
artikel |
13 |
Phone Hacking Scandal: Who's Getting the Message?
|
Mortleman, Jim |
|
2011 |
8 |
6 |
p. 36-39 4 p. |
artikel |
14 |
Slack Space
|
|
|
2011 |
8 |
6 |
p. 48- 1 p. |
artikel |
15 |
The Good, the Bad, and the Ugly Insider Threats
|
|
|
2011 |
8 |
6 |
p. 30-32 3 p. |
artikel |
16 |
Year of the Hack
|
Donovan, Fred |
|
2011 |
8 |
6 |
p. 8-10 3 p. |
artikel |