Journal: Network Security

Volume 2011, Issue 9

5 -- 8Steve Gold. Cracking cellular networks via femtocells
8 -- 11Cath Everett. Printers: the neglected threat
11 -- 16Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian. Protecting personal data from untrusted web-based data services
16 -- 18Alex de Joode. Effective corporate security and cybercrime
18 -- 19Graeme Creasey. Protecting the datacentre