default search action
Network Security, Volume 2012
Volume 2012, Number 1, January 2012
- David Harley:
AMTSO: the test of time? 5-10 - Simon Woodhead:
Monitoring bad traffic with darknets. 10-14 - Jaime Ryan:
Rethinking the ESB: building a secure bus with an SOA gateway. 14-17 - Shadi Rasheed Masadeh, Nedal Turab, Farhan Obisat:
A secure model for building e-learning systems. 17-20
Volume 2012, Number 2, February 2012
- Gordon Thomson:
BYOD: enabling the chaos. 5-8 - Melvyn Wray:
From server consolidation to network consolidation. 8-11 - Luca Caviglione, Alessio Merlo:
The energy impact of security mechanisms in modern mobile devices. 11-14 - David Schneider:
The state of network security. 14-20
Volume 2012, Number 3, March 2012
- Simon Denman:
Why multi-layered security is still the best defence. 5-7 - Ross Brewer:
Protecting critical control systems. 7-10 - Jason Rouse:
Mobile devices - the most hostile environment for security? 11-13 - Steve Gold:
Securing VoIP. 14-17 - Mike Dowling:
Enabling remote working: protecting the network. 18-20
Volume 2012, Number 4, April 2012
- Michael de Crespigny:
Building cyber-resilience to tackle threats. 5-8 - Colin Tankard:
Taking the management pain out of Active Directory. 8-11 - Brian Robertson:
Security: virtualisation's last frontier. 12-15 - Bernard Everett:
The encryption conundrum. 15-18 - Christy Serrato:
Identity assurance and network security. 19-20
Volume 2012, Number 5, May 2012
- Andrew Mason:
Caught in the cross-site scripting fire. 5-9 - Steve Gold:
Wireless cracking: there's an app for that. 10-14 - Rushdi Hamamreh:
Routing path authentication in link-state routing protocols. 14-20
Volume 2012, Number 6, June 2012
- Windows Forensic Analysis Toolkit. 4
- Greg Jones:
Mobile menace: why SDR poses such a threat. 5-7 - Paul Kenyon:
What Australia can teach the world about least privilege. 7-10 - Kurt Bager:
Remote access: don't be a victim. 11-14 - Tracey Caldwell:
Locking down the VPN. 14-18 - Ori Eisen:
Catching the fraudulent Man-in-the-Middle. 18-20
Volume 2012, Number 7, July 2012
- Colin Tankard:
Big data security. 5-8 - Mike Potts:
The state of information security. 9-11 - Steve Mansfield-Devine:
Estonia: what doesn't kill you makes you stronger. 12-20
Volume 2012, Number 8, August 2012
- Book Review. 4
- Book Review. 4
- James Conrad:
Seeking help: the important role of ethical hackers. 5-8 - Tracey Caldwell:
The perimeter is dead - what next for the appliance? 8-12 - Danny Bradbury:
Fighting botnets with sinkholes. 12-15 - Steve Gold:
Cellular jamming. 15-18 - Florian Malecki:
Simple ways to dodge the DDoS bullet. 18-20
Volume 2012, Number 9, September 2012
- Book Review. 4
- Steve Mansfield-Devine:
Paranoid Android: just how insecure is the most popular mobile platform? 5-10 - Colin Tankard:
The promise of managed security services. 10-15 - Tracey Caldwell:
Seek and destroy. 15-19
Volume 2012, Number 10, October 2012
- Steve Mansfield-Devine:
Android architecture: attacking the weak points. 5-12 - Michael Jordon:
Cleaning up dirty disks in the cloud. 12-15 - Danny Bradbury:
Spreading fear on Facebook. 15-17 - Madeleine Adrienne Bihina Bella, Jan H. P. Eloff, Martin S. Olivier:
Improving system availability with near-miss analysis. 18-20
Volume 2012, Number 11, November 2012
- Colin Tankard:
Cultural issues in security and privacy. 5-8 - Dirk Paessler:
Monitoring private clouds. 8-12 - Steve Mansfield-Devine:
Android malware and mitigations. 12-20
Volume 2012, Number 12, December 2012
- Practical Malware Analysis. 4
- Encyclopedia of Electronic Components Volume 1. 4
- Bill Morrow:
BYOD security challenges: control and protect your most sensitive data. 5-8 - Aditya K. Sood, Peter Greko, Richard J. Enbody:
Abusing Glype proxies: attacks, exploits and defences. 8-15 - Steve Gold:
Virtual jihad: how real is the threat? 15-18 - Florian Malecki:
Next-generation firewalls: security with performance. 19-20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.