Journal: Network Security

Volume 2014, Issue 2

5 -- 8Mark Kedgley. File integrity monitoring in the modern threat landscape
8 -- 10Peter Heim. The quest for clarity on data protection and security
11 -- 12Stephen Allen. Medical device software under the microscope
12 -- 15Hongwen Zhang. A vision for cloud security
15 -- 20Steve Gold. In search of a new perimeter