default search action
Network Security, Volume 2011
Volume 2011, Number 1, January 2011
- Steve Mansfield-Devine:
Anonymous: serious threat or mere annoyance? 4-10 - Edward Amoroso:
Cyber attacks: awareness. 10-16 - Steve Gold:
Advanced evasion techniques. 16-19
Volume 2011, Number 2, February 2011
- Steve Durbin:
Information security without boundaries. 4-8 - Danny Bradbury:
Hacking wifi the easy way. 9-12 - Steve Gold:
The future of the firewall. 13-15 - David Ting:
Thinking thin: addressing the challenges of client computing. 16-17 - Michael Hamelin:
Preparing for a firewall audit. 18-19
Volume 2011, Number 3, March 2011
- Mark John Taylor, John Haggerty, David Gresty, David J. Lamb:
Forensic investigation of cloud computing systems. 4-10 - Russell Sanderson:
A secure data protection strategy. 10-12 - Shadi A. Aljawarneh:
A web engineering security methodology for e-learning systems. 12-15 - Steve Gold:
IPv6 migration and security. 15-18 - Alexei Lesnykh:
Data loss prevention: a matter of discipline. 18-19
Volume 2011, Number 4, April 2011
- Tracey Caldwell:
Smart security. 5-9 - Andy Kemshall:
Why mobile two-factor authentication makes sense. 9-12 - Steve Gold:
Cracking GSM. 12-15 - Richard Blandford:
Information security in the cloud. 15-17 - Steve Jenkins:
Learning to love SIEM. 18-19
Volume 2011, Number 5, May 2011
- Danny Bradbury:
Routing around censorship. 5-8 - Aditya K. Sood, Richard J. Enbody:
Spying on the browser: dissecting the design of malicious extensions. 8-12 - Steve Gold:
Taking down botnets. 13-15 - Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian, Kent E. Seamons:
DataVault: secure mobile access and data sharing. 16-19
Volume 2011, Number 6, June 2011
- Steve Durbin:
Tackling converged threats: building a security-positive environment. 5-8 - Tracey Caldwell:
When worlds collide: the security of converged networks. 8-12 - Jeff Hudson:
Weaponised malware: how criminals use digital certificates to cripple your organisation. 12-14 - Steve Gold:
The rebirth of phreaking. 15-17 - Marc Hocking:
Thin client security in the cloud. 17-19
Volume 2011, Number 7, July 2011
- Steve Gold:
Terrorism and Bluetooth. 5-7 - Will Gragido:
Beyond zero: analysing threat trends. 7-9 - Tracey Caldwell:
Ethical hackers: putting on the white hat. 10-13 - R. Sreeram Sreenivas, R. Anitha:
Detecting keyloggers based on traffic analysis with periodic behaviour. 14-19
Volume 2011, Number 8, August 2011
- Steve Mansfield-Devine:
Hacktivism: assessing the damage. 5-13 - Avi Turiel:
IPv6: new technology, new threats. 13-15 - Colin Tankard:
Advanced Persistent threats and how to monitor and deter them. 16-19
Volume 2011, Number 9, September 2011
- Steve Gold:
Cracking cellular networks via femtocells. 5-8 - Cath Everett:
Printers: the neglected threat. 8-11 - Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian:
Protecting personal data from untrusted web-based data services. 11-16 - Alex de Joode:
Effective corporate security and cybercrime. 16-18 - Graeme Creasey:
Protecting the datacentre. 18-19
Volume 2011, Number 10, October 2011
- Steve Gold:
Android insecurity. 5-7 - Aditya K. Sood, Richard J. Enbody:
Frametrapping the framebusting defence. 8-12 - James Harris:
Defending the network several times over. 12-14 - Rohan Nanda, P. Venkata Krishna:
Mitigating denial of service attacks in hierarchical wireless sensor networks. 14-18 - Richard Morrell, Akash Chandrashekar:
Cloud computing: new challenges and opportunities. 18-19
Volume 2011, Number 11, November 2011
- Frank Andrus:
Beyond scan and block: an adaptive approach to network access control. 5-9 - Gordon Thomson:
APTs: a poorly understood challenge. 9-11 - Klaus Gheri:
The benefits of application detection. 12-14 - Steve Gold:
Cracking wireless networks. 14-18 - Stuart Facey:
Who's in control: a six-step strategy for secure IT. 18-20
Volume 2011, Number 12, December 2011
- Steve Mansfield-Devine:
DDoS: threats and mitigation. 5-12 - Jérémy D'Hoinne:
Could 'wait and see' be the best IPv6 strategy? 12-14 - Steve Gold:
Understanding the hacker psyche. 15-17 - Florian Malecki:
A deeper, broader look at network security. 18-19
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.