researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Network Security
Home
Index
Info
Volume
Volume
2013
, Issue
9
5
--
7
Oscar Arean
.
Disaster recovery in the cloud
8
--
12
Tony Kenyon
.
The role of ADCs within secure application delivery
12
--
15
Dan Dunford
.
Managed file transfer: the next stage for data in motion?
15
--
17
Richard Hibbert
.
Calling time on compliance spreadsheet overload
17
--
20
Steve Mansfield-Devine
.
Interview: Jon Callas, Silent Circle
Volume
2013
, Issue
8
5
--
6
John Thielens
.
Why APIs are central to a BYOD security strategy
7
--
10
Tom Gaffney
.
Following in the footsteps of Windows: how Android malware development is looking very familiar
11
--
13
Steve Mansfield-Devine
.
Interview: Mick Ebsworth - a matter of trust
14
--
19
Steve Gold
.
Subverting cellular technology: evolution, not revolution
Volume
2013
, Issue
7
5
--
8
Tim Ring
.
IT's megatrends: the security impact
9
--
12
Danny Bradbury
.
Offensive defence
12
--
15
Patrick Scully
.
Under lock and key: protecting the network from attack
15
--
18
Norman Begg
.
Securely sharing access to sensitive data
18
--
20
Patrick Kerpan
,
Sam Mitchell
.
Bringing control to the business application layer
Volume
2013
, Issue
6
5
--
9
Keith Barker
.
The security implications of IPv6
10
--
13
Steve Gold
.
Getting lost on the Internet: the problem with anonymity
14
--
16
Tim Brooks
.
Classic enterprise IT: the castle approach
16
--
19
Steve Mansfield-Devine
.
Q&A: Colin Tankard - raising security awareness
Volume
2013
, Issue
5
5
--
6
Steve McGregory
.
Preparing for the next DDoS attack
6
--
12
Tracey Caldwell
.
Security at the data level
12
--
14
Jane Grafton
.
Avoiding the five pitfalls of privileged accounts
14
--
18
Steve Gold
.
Black Hat Europe: mobile attack vectors in the spotlight
18
--
20
Mark Hirst
.
Rack security and protection
Volume
2013
, Issue
4
5
--
11
Richard Walters
.
Bringing IT out of the shadows
12
--
13
Brian Tokuyoshi
.
The security implications of BYOD
14
--
18
Tracey Caldwell
.
Identity - the new perimeter
18
--
20
Gary Newbold
.
Secure mobility in healthcare networks for optimal patient care
Volume
2013
, Issue
3
5
--
6
Dan Pitt
.
Trust in the cloud: the role of SDN
7
--
11
Corey Nachreiner
.
Beat security auditors at their own game
12
--
14
Robert Winter
.
SSD vs HDD - data recovery and destruction
14
--
17
Peter Bassill
.
The holistic approach to security
17
--
20
Shannon Fehr
.
Flexible networks for better security
Volume
2013
, Issue
2
5
--
7
Greg Jones
.
Penetrating the cloud
8
--
9
Mark Hirst
.
Securing your telemetry: making DCIM unsniffable
10
--
12
Marc Meulensteen
.
A smart grid must also be streetwise
13
--
15
Jane Goh
.
Moving security testing into the developer's domain
15
--
18
Steve Gold
.
Electronic countersurveillance strategies
19
--
20
Don Smith
.
Life's certainties: death, taxes and APTs
Volume
2013
, Issue
12
5
--
6
Steve Johnson
.
Bringing IT out of the shadows
7
--
9
Shaun Hipgrave
.
Smarter fraud investigations with big data analytics
10
--
11
Marc Meulensteen
.
Critical infrastructure gets streetwise
12
--
15
Steve Mansfield-Devine
.
John Lyons, ICSPA: Resetting the clock on international co-operation
15
--
18
Steve Gold
.
Understanding the digital fingerprint
19
--
20
Tim Austwick
.
Using Oracle Apex securely
Volume
2013
, Issue
11
5
--
8
Alistair Macrae
.
Identifying threats in real time
8
--
11
John Shaw
.
Dealing with encryption
12
--
14
Phil Allen
.
The importance of data protection inside your enterprise
15
--
17
E. J. Hilbert
.
Living with cybercrime
17
--
20
Steve Mansfield-Devine
.
Colin Tankard, Digital Pathways: confusion in the cloud
Volume
2013
, Issue
10
5
--
8
Mike Small
.
From data breach to information stewardship
8
--
12
Sam Erdheim
.
Deployment and management with next-generation firewalls
12
--
14
Brian Chappell
.
Privilege management - the industry's best kept secret
14
--
17
Scott Baker
.
IP-based technology - the future of the security industry
18
--
20
Steve Mansfield-Devine
.
Interview: Seth Hallem, Mobile Helix - the right way to mobile security
Volume
2013
, Issue
1
4
--
0
.
Think Like a Programmer
4
--
0
.
CUDA Programming
5
--
7
Danny Bradbury
.
Verifying software security - is it possible?
8
--
11
Thorsten Kurpjuhn
.
The evolving role of the UTM appliance
12
--
14
Jason Hart
.
Why the traditional approach to information security is no longer working
15
--
18
Wasim Ahmad Bhat
,
S. M. K. Quadri
.
Understanding and mitigating security issues in Sun NFS
18
--
20
Andrew Walker-Brown
.
Managing VPNs in the mobile worker's world