


default search action
Network Security, Volume 2010
Volume 2010, Number 1, January 2010
- Rik Fergusonnam:

Back to the future. 4-7 - Steven Furnell

:
Mac security: An Apple that can't be bitten? 7-11 - Steve Mansfield-Devine:

The perils of sharing. 11-13 - Sindhu Xirasagar, Masoud Mojtahed:

Securing IP networks. 13-17 - Dario V. Forte:

The responsibilities of an incident responder. 18-19
Volume 2010, Number 2, February 2010
- Andrew Brandt, Zachary Wolff:

When admins attack: 30 hours in the life of a Gumblar victim. 4-8 - Tom Rowan:

Negotiating WiFi security. 8-12 - Alan Goode:

Managing mobile security: How are we doing? 12-15 - Danny McPherson:

Cybercrime - A game of cat and mouse in 2009. 15-18 - Dario Forte:

Preventing and investigating hacking by auditing web applications. 18-20
Volume 2010, Number 3, March 2010
- Steve Mansfield-Devine:

Divide and conquer: the threats posed by hybrid apps and HTML 5. 4-6 - Georg Wicherski:

Placing a low-interaction honeypot in-the-wild: A review of mwcollectd. 7-8 - Robert Janssen:

VDI and security. 8-11 - Luis Corrons:

The rise and rise of NDR. 12-16 - S. Chandra, R. A. Khan:

Confidentiality checking an object-oriented class hierarchy. 16-20
Volume 2010, Number 4, April 2010
- Aaron Portnoy:

Pwn2Own wrap up and analysis. 4-5 - Paul Wood:

Bot wars: the spammers strike back. 5-8 - Graham Cluley:

Sizing up the malware threat - key malware trends for 2010. 8-10 - Ori Eisen:

Catching the fraudulent Man-in-the-Middle and Man-in-the-Browser. 11-12 - James Carnie:

Preserving security in a multi-tenanted hosting environment. 12-15 - Paul Vlissidis, Matthew Hickey:

Thin clients: slim security? 16-19
Volume 2010, Number 5, May 2010
- Steve Mansfield-Devine:

Battle of the botnets. 4-6 - Paul Steiner:

Why FTP is no longer up to the job. 7-9 - Simon Heron:

Denial of service: motivations and trends. 10-12 - Adrian Davis:

Managing third parties - an information security perspective. 13-15 - Danny Bradbury:

Shadows in the cloud: Chinese involvement in advanced persistent threats. 16-19
Volume 2010, Number 6, June 2010
- Daniel Karrenberg:

DNSSEC: Securing the global infrastructure of the Internet. 4-6 - Shadi A. Aljawarneh, Shadi Rasheed Masadeh, Faisal Alkhateeb

:
A secure wifi system for wireless networks: an experimental evaluation. 6-12 - Danny Bradbury:

A hole in the security wall: ATM hacking. 12-15 - Michael Hamelin:

Preventing firewall meltdowns. 15-16 - Luther Martin:

Protecting credit card information: encryption vs tokenisation. 17-19
Volume 2010, Number 7, July 2010
- Rodney Joffee:

Cybercrime: the global epidemic at your network door. 4-7 - Danny Bradbury:

Hands-on with Metasploit Express. 7-11 - Jay Schiavo:

Code signing for end-user peace of mind. 11-13 - Ori Eisen:

Online security - a new strategic approach. 14-15 - Des Ward:

The cost of saving money: no longer the company reputation. 15-19
Volume 2010, Number 8, August 2010
- Steve Gold:

Cracking passwords. 4-7 - Dominic Storey:

Ten consequences of network blindness. 7-9 - Seong-Hwan Kim, Sundar Vedantham, Pravin Pathak:

SMB gateway firewall implementation using a network processor. 10-15 - Graham Smith:

Countering datacentre security pressures. 15-17 - Stephen Midgley:

The state of encryption in Europe: some cultural comparisons. 18-19
Volume 2010, Number 9, September 2010
- Simon Bransfield-Garth:

Mobile phone calls as a business risk. 4-11 - Mark John Taylor, John Haggerty, David Gresty, Paul Fergus

:
Forensic investigation of peer-to-peer networks. 12-15 - Steve Gold:

Password alternatives. 16-19
Volume 2010, Number 10, October 2010
- Maria Papadaki

, Steven Furnell
:
Vulnerability management: an attitude of mind? 4-8 - Patrice Perche:

Network latency: avoid paying a tax on time. 9-12 - Oleg Zaitsev:

Skeleton keys: the purpose and applications of keyloggers. 12-17 - Eric Knight:

Investigating digital fingerprints: advanced log analysis. 17-20
Volume 2010, Number 11, November 2010
- Danny Bradbury:

Avoiding URL hell. 4-6 - Richard Walters:

Managing privileged user activity in the datacentre. 6-10 - Steve Gold:

Social engineering today: psychology, strategies and tricks. 11-14 - Marc Boroditsky:

Click, click, who's there? 14-16 - Rob Warmack:

Compliance today - and tomorrow. 16-18 - Nick Cavalancia:

Preventing data loss by securing USB ports. 18-20
Volume 2010, Number 12, December 2010
- Shlomi Dinoor:

Privileged identity management: securing the enterprise. 4-6 - Philip Ridley:

Outsmarting the smartphone fraudsters. 7-9 - Steve Gold:

Protecting the cloud: attack vectors and other exploits. 10-12 - Steven Furnell

:
Usability versus complexity - striking the balance in end-user security. 13-17 - Marcus J. Ranum:

The well-meaning threat. 17-19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














