Journal: Network Security

Volume 2014, Issue 4

5 -- 9Ross Brewer. Advanced persistent threats: minimising the damage
9 -- 14Harry Sverdlove. The Java vulnerability landscape
14 -- 17Danny Bradbury. Unveiling the dark web
18 -- 20Keith Bird. Sandboxing: a line in the sand against malware