Journal: Network Security

Volume 2015, Issue 6

5 -- 8Tim Ring. Keeping tabs on tracking technology
8 -- 10Stuart Hooson. Smarten your data security before new EU legislation or risk corporate loss
11 -- 14Szilard Stange. Detecting malware across operating systems
15 -- 17David Hald, Alex Udakis. Rethinking remote authentication: time to kiss tokens goodbye?
18 -- 20Boris Huard. The data quality paradox