default search action
Network Security, Volume 2013
Volume 2013, Number 1, January 2013
- CUDA Programming. 4
- Think Like a Programmer. 4
- Danny Bradbury:
Verifying software security - is it possible? 5-7 - Thorsten Kurpjuhn:
The evolving role of the UTM appliance. 8-11 - Jason Hart:
Why the traditional approach to information security is no longer working. 12-14 - Wasim Ahmad Bhat, S. M. K. Quadri:
Understanding and mitigating security issues in Sun NFS. 15-18 - Andrew Walker-Brown:
Managing VPNs in the mobile worker's world. 18-20
Volume 2013, Number 2, February 2013
- Greg Jones:
Penetrating the cloud. 5-7 - Mark Hirst:
Securing your telemetry: making DCIM unsniffable. 8-9 - Marc Meulensteen:
A smart grid must also be streetwise. 10-12 - Jane Goh:
Moving security testing into the developer's domain. 13-15 - Steve Gold:
Electronic countersurveillance strategies. 15-18 - Don Smith:
Life's certainties: death, taxes and APTs. 19-20
Volume 2013, Number 3, March 2013
- Dan Pitt:
Trust in the cloud: the role of SDN. 5-6 - Corey Nachreiner:
Beat security auditors at their own game. 7-11 - Robert Winter:
SSD vs HDD - data recovery and destruction. 12-14 - Peter Bassill:
The holistic approach to security. 14-17 - Shannon Fehr:
Flexible networks for better security. 17-20
Volume 2013, Number 4, April 2013
- Richard Walters:
Bringing IT out of the shadows. 5-11 - Brian Tokuyoshi:
The security implications of BYOD. 12-13 - Tracey Caldwell:
Identity - the new perimeter. 14-18 - Gary Newbold:
Secure mobility in healthcare networks for optimal patient care. 18-20
Volume 2013, Number 5, May 2013
- Steve McGregory:
Preparing for the next DDoS attack. 5-6 - Tracey Caldwell:
Security at the data level. 6-12 - Jane Grafton:
Avoiding the five pitfalls of privileged accounts. 12-14 - Steve Gold:
Black Hat Europe: mobile attack vectors in the spotlight. 14-18 - Mark Hirst:
Rack security and protection. 18-20
Volume 2013, Number 6, June 2013
- Keith Barker:
The security implications of IPv6. 5-9 - Steve Gold:
Getting lost on the Internet: the problem with anonymity. 10-13 - Tim Brooks:
Classic enterprise IT: the castle approach. 14-16 - Steve Mansfield-Devine:
Q&A: Colin Tankard - raising security awareness. 16-19
Volume 2013, Number 7, July 2013
- Tim Ring:
IT's megatrends: the security impact. 5-8 - Danny Bradbury:
Offensive defence. 9-12 - Patrick Scully:
Under lock and key: protecting the network from attack. 12-15 - Norman Begg:
Securely sharing access to sensitive data. 15-18 - Patrick Kerpan, Sam Mitchell:
Bringing control to the business application layer. 18-20
Volume 2013, Number 8, August 2013
- John Thielens:
Why APIs are central to a BYOD security strategy. 5-6 - Tom Gaffney:
Following in the footsteps of Windows: how Android malware development is looking very familiar. 7-10 - Steve Mansfield-Devine:
Interview: Mick Ebsworth - a matter of trust. 11-13 - Steve Gold:
Subverting cellular technology: evolution, not revolution. 14-19
Volume 2013, Number 9, September 2013
- Oscar Arean:
Disaster recovery in the cloud. 5-7 - Tony Kenyon:
The role of ADCs within secure application delivery. 8-12 - Dan Dunford:
Managed file transfer: the next stage for data in motion? 12-15 - Richard Hibbert:
Calling time on compliance spreadsheet overload. 15-17 - Steve Mansfield-Devine:
Interview: Jon Callas, Silent Circle. 17-20
Volume 2013, Number 10, October 2013
- Mike Small:
From data breach to information stewardship. 5-8 - Sam Erdheim:
Deployment and management with next-generation firewalls. 8-12 - Brian Chappell:
Privilege management - the industry's best kept secret. 12-14 - Scott Baker:
IP-based technology - the future of the security industry. 14-17 - Steve Mansfield-Devine:
Interview: Seth Hallem, Mobile Helix - the right way to mobile security. 18-20
Volume 2013, Number 11, November 2013
- Alistair Macrae:
Identifying threats in real time. 5-8 - John Shaw:
Dealing with encryption. 8-11 - Phil Allen:
The importance of data protection inside your enterprise. 12-14 - E. J. Hilbert:
Living with cybercrime. 15-17 - Steve Mansfield-Devine:
Colin Tankard, Digital Pathways: confusion in the cloud. 17-20
Volume 2013, Number 12, December 2013
- Steve Johnson:
Bringing IT out of the shadows. 5-6 - Shaun Hipgrave:
Smarter fraud investigations with big data analytics. 7-9 - Marc Meulensteen:
Critical infrastructure gets streetwise. 10-11 - Steve Mansfield-Devine:
John Lyons, ICSPA: Resetting the clock on international co-operation. 12-15 - Steve Gold:
Understanding the digital fingerprint. 15-18 - Tim Austwick:
Using Oracle Apex securely. 19-20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.