Journal: Network Security

Volume 2014, Issue 8

5 -- 8Phil Bridge. EU puts pressure on businesses to erase data
8 -- 11Andrew Tang. A guide to penetration testing
11 -- 13Mark Lowe. Defending against cyber-criminals targeting business websites
14 -- 17Steve Mansfield-Devine. Not coping with change
17 -- 20Steve Watts. Intelligent combination - the benefits of tokenless two-factor authentication