Journal: Network Security

Volume 2012, Issue 10

5 -- 12Steve Mansfield-Devine. Android architecture: attacking the weak points
12 -- 15Michael Jordon. Cleaning up dirty disks in the cloud
15 -- 17Danny Bradbury. Spreading fear on Facebook
18 -- 20Madeleine Adrienne Bihina Bella, Jan H. P. Eloff, Martin S. Olivier. Improving system availability with near-miss analysis