General

ÑñûëêàÄàòàÎáúåì â êáàéòàõ×èñëî ñòðàíèöÑïðàâêà
Is There a Security Problem in Computing? 2006 586 36 Security articles
Strengthening network Security with on DemanD Vulnerability management anD Policy comPliance 2008 763 6  
Advanced Information Assurance Handbook March 2004 10219 283  
Fundamental Principles of Network Security By Christopher Leidigh 2009 1113 14  
Building a Successful Security Operations Center 2010 812 11  
Around the world in IP attacks Bob Eisenhardt 2012 94 15  
BDNA for Security Strengthened Security Through Visibility 2010 574 6  
Data Drain by Rich Mogull 2009 835 4  
Information Management Policies By Randolph A. Kahn and Barclay T. Blair 2009 690 23  
Essential Guide SIMs Today security information management systems can be used for proactive risk management and business intelligence. We’ll explain how this can be achieved. 2009 5225 35  
Microsoft Security Intelligence Report December 2009 24387 248  
Network Security for 2010 and Beyond – The Impact of The Consumerization, Webification, Virtualization, and Consolidation of IT Mark Bouchard 2010 254 7  
Security Principles 2009 578 18  
Unveiling the Security Illusion: the need for active network forensics Unveiling the Security Illusion: the need for active 2010 623 12  
Infornation-Centric Security. Confronting the Threats to Your Network 2009 382 8  
Securing Layer 2 2010 771 6  
(The Need for) Inherently Secure Communications 2012 349 6  
Cybersecurity in 2020: The future looks bleak May 17, 2016 390 3 Michael Kassner
Encrypted communications could have an undetectable backdoor Oct 11, 2016 387 2 Lucian Constantin, IDG News Service
Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere. 2017 1593 13 Juniper