- Marc Hocking:
Thin client security in the cloud. Netw. Secur. 2011(6): 17-19 (2011) - Jeff Hudson:
Weaponised malware: how criminals use digital certificates to cripple your organisation. Netw. Secur. 2011(6): 12-14 (2011) - Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian:
Protecting personal data from untrusted web-based data services. Netw. Secur. 2011(9): 11-16 (2011) - Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian, Kent E. Seamons:
DataVault: secure mobile access and data sharing. Netw. Secur. 2011(5): 16-19 (2011) - Steve Jenkins:
Learning to love SIEM. Netw. Secur. 2011(4): 18-19 (2011) - Alex de Joode:
Effective corporate security and cybercrime. Netw. Secur. 2011(9): 16-18 (2011) - Andy Kemshall:
Why mobile two-factor authentication makes sense. Netw. Secur. 2011(4): 9-12 (2011) - Alexei Lesnykh:
Data loss prevention: a matter of discipline. Netw. Secur. 2011(3): 18-19 (2011) - Florian Malecki:
A deeper, broader look at network security. Netw. Secur. 2011(12): 18-19 (2011) - Steve Mansfield-Devine:
Anonymous: serious threat or mere annoyance? Netw. Secur. 2011(1): 4-10 (2011) - Steve Mansfield-Devine:
Hacktivism: assessing the damage. Netw. Secur. 2011(8): 5-13 (2011) - Steve Mansfield-Devine:
DDoS: threats and mitigation. Netw. Secur. 2011(12): 5-12 (2011) - Richard Morrell, Akash Chandrashekar:
Cloud computing: new challenges and opportunities. Netw. Secur. 2011(10): 18-19 (2011) - Rohan Nanda, P. Venkata Krishna:
Mitigating denial of service attacks in hierarchical wireless sensor networks. Netw. Secur. 2011(10): 14-18 (2011) - Russell Sanderson:
A secure data protection strategy. Netw. Secur. 2011(3): 10-12 (2011) - Aditya K. Sood, Richard J. Enbody:
Spying on the browser: dissecting the design of malicious extensions. Netw. Secur. 2011(5): 8-12 (2011) - Aditya K. Sood, Richard J. Enbody:
Frametrapping the framebusting defence. Netw. Secur. 2011(10): 8-12 (2011) - R. Sreeram Sreenivas, R. Anitha:
Detecting keyloggers based on traffic analysis with periodic behaviour. Netw. Secur. 2011(7): 14-19 (2011) - Colin Tankard:
Advanced Persistent threats and how to monitor and deter them. Netw. Secur. 2011(8): 16-19 (2011) - Mark John Taylor, John Haggerty, David Gresty, David J. Lamb:
Forensic investigation of cloud computing systems. Netw. Secur. 2011(3): 4-10 (2011) - Gordon Thomson:
APTs: a poorly understood challenge. Netw. Secur. 2011(11): 9-11 (2011) - David Ting:
Thinking thin: addressing the challenges of client computing. Netw. Secur. 2011(2): 16-17 (2011) - Avi Turiel:
IPv6: new technology, new threats. Netw. Secur. 2011(8): 13-15 (2011)