Journal: Network Security

Volume 2012, Issue 9

4 -- 0. Book Review
5 -- 10Steve Mansfield-Devine. Paranoid Android: just how insecure is the most popular mobile platform?
10 -- 15Colin Tankard. The promise of managed security services
15 -- 19Tracey Caldwell. Seek and destroy

Volume 2012, Issue 8

4 -- 0. Book Review
4 -- 0. Book Review
5 -- 8James Conrad. Seeking help: the important role of ethical hackers
8 -- 12Tracey Caldwell. The perimeter is dead - what next for the appliance?
12 -- 15Danny Bradbury. Fighting botnets with sinkholes
15 -- 18Steve Gold. Cellular jamming
18 -- 20Florian Malecki. Simple ways to dodge the DDoS bullet

Volume 2012, Issue 7

5 -- 8Colin Tankard. Big data security
9 -- 11Mike Potts. The state of information security
12 -- 20Steve Mansfield-Devine. Estonia: what doesn't kill you makes you stronger

Volume 2012, Issue 6

4 -- 0. Windows Forensic Analysis Toolkit
5 -- 7Greg Jones. Mobile menace: why SDR poses such a threat
7 -- 10Paul Kenyon. What Australia can teach the world about least privilege
11 -- 14Kurt Bager. Remote access: don't be a victim
14 -- 18Tracey Caldwell. Locking down the VPN
18 -- 20Ori Eisen. Catching the fraudulent Man-in-the-Middle

Volume 2012, Issue 5

5 -- 9Andrew Mason. Caught in the cross-site scripting fire
10 -- 14Steve Gold. Wireless cracking: there's an app for that
14 -- 20Rushdi Hamamreh. Routing path authentication in link-state routing protocols

Volume 2012, Issue 4

5 -- 8Michael de Crespigny. Building cyber-resilience to tackle threats
8 -- 11Colin Tankard. Taking the management pain out of Active Directory
12 -- 15Brian Robertson. Security: virtualisation's last frontier
15 -- 18Bernard Everett. The encryption conundrum
19 -- 20Christy Serrato. Identity assurance and network security

Volume 2012, Issue 3

5 -- 7Simon Denman. Why multi-layered security is still the best defence
7 -- 10Ross Brewer. Protecting critical control systems
11 -- 13Jason Rouse. Mobile devices - the most hostile environment for security?
14 -- 17Steve Gold. Securing VoIP
18 -- 20Mike Dowling. Enabling remote working: protecting the network

Volume 2012, Issue 2

5 -- 8Gordon Thomson. BYOD: enabling the chaos
8 -- 11Melvyn Wray. From server consolidation to network consolidation
11 -- 14Luca Caviglione, Alessio Merlo. The energy impact of security mechanisms in modern mobile devices
14 -- 20David Schneider. The state of network security

Volume 2012, Issue 12

4 -- 0. Practical Malware Analysis
4 -- 0. Encyclopedia of Electronic Components Volume 1
5 -- 8Bill Morrow. BYOD security challenges: control and protect your most sensitive data
8 -- 15Aditya K. Sood, Peter Greko, Richard J. Enbody. Abusing Glype proxies: attacks, exploits and defences
15 -- 18Steve Gold. Virtual jihad: how real is the threat?
19 -- 20Florian Malecki. Next-generation firewalls: security with performance

Volume 2012, Issue 11

5 -- 8Colin Tankard. Cultural issues in security and privacy
8 -- 12Dirk Paessler. Monitoring private clouds
12 -- 20Steve Mansfield-Devine. Android malware and mitigations

Volume 2012, Issue 10

5 -- 12Steve Mansfield-Devine. Android architecture: attacking the weak points
12 -- 15Michael Jordon. Cleaning up dirty disks in the cloud
15 -- 17Danny Bradbury. Spreading fear on Facebook
18 -- 20Madeleine Adrienne Bihina Bella, Jan H. P. Eloff, Martin S. Olivier. Improving system availability with near-miss analysis

Volume 2012, Issue 1

5 -- 10David Harley. AMTSO: the test of time?
10 -- 14Simon Woodhead. Monitoring bad traffic with darknets
14 -- 17Jaime Ryan. Rethinking the ESB: building a secure bus with an SOA gateway
17 -- 20Shadi R. Masadeh, Nedal Turab, Farhan Obisat. A secure model for building e-learning systems