ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
A Complete Bibliography of Publications in Network
Security
Nelson H. F. BeebeUniversity of Utah
Department of Mathematics, 110 LCB155 S 1400 E RM 233
[1] Ann Steffora. User education critical toeffective network security. Network Se-curity, 1994(6):2, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900280.
Steffora:1994:ICM
[2] Ann Steffora. Internet commu-nity has many ways to handle se-curity infringements. Network Secu-rity, 1994(6):3, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900299.
REFERENCES 51
Anonymous:1994:FFC
[3] Anonymous. Flaw found in Clip-per technology. Network Security,1994(6):3–4, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[17] Steven Michaels. LAN users arelax on security. Network Secu-rity, 1994(6):8, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900442.
Riggs:1994:COC
[18] Brian Riggs. Cracking down ononline crime. Network Security,1994(6):8, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900450.
Highland:1994:HSD
[19] Harold Joseph Highland. How secure isdata over the Internet? Network Secu-rity, 1994(6):9–11, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900469.
Peterson:1994:FMT
[20] Padgett Peterson. The fortressmentality: Its time has comeagain. Network Security, 1994(6):12–13, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900477.
Hancock:1994:IPS
[21] William M. Hancock. Issues and prob-lems in secure remote access. Net-work Security, 1994(6):14–18, June1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485894900485.
Lindup:1994:TRH
[22] Ken Lindup. Is there a role for hack-ers in polite society? Network Secu-
[23] Lisa Armstrong. Are public net-works safe? Network Security,1994(7):2, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900019.
Snell:1994:PIN
[24] Monica Snell. Protecting the in-ternal network. Network Security,1994(7):2, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900027.
English:1994:CNI
[25] Erin English. Cache of nude im-ages found at nuclear weapons lab.Network Security, 1994(7):2–3, July1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[27] Anonymous. Changes to come for DCS.Network Security, 1994(7):3–4, July1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485894900051.
Anonymous:1994:LMO
[28] Anonymous. LAN mail to over-take host mail. Network Secu-rity, 1994(7):4, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589490006X.
Anonymous:1994:NPS
[29] Anonymous. Novell and PC se-curity collaborate. Network Secu-rity, 1994(7):4, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900078.
Anonymous:1994:CAM
[30] Anonymous. Communications avail-able to more countries. Network Se-curity, 1994(7):4, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900086.
Snell:1994:LNI
[31] Monica Snell. Lotus notes the In-ternet advantage. Network Security,1994(7):4–5, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900094.
REFERENCES 54
Armstrong:1994:SN
[32] Lisa Armstrong. A sparekey to Net-ware. Network Security, 1994(7):5, July1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485894900108.
Lawrence:1994:SCS
[33] L. G. Lawrence. Security in a clientserver environment. Network Secu-rity, 1994(7):5–15, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900116.
Gordon:1994:SSH
[34] S. Gordon and I. Nedelchev. Sniff-ing in the sun: History of adisaster. Network Security, 1994(7):16–19, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[62] Anonymous. The Internet becomes thehigh seas of piracy. Network Security,1994(9):2–3, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[66] Anonymous. New UK data pro-tection registrar. Network Security,1994(9):4, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[93] Anonymous. Microsoft launch newonline service. Network Security,1994(10):4, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900582.
Anonymous:1994:PND
[94] Anonymous. PC network disasterrecovery. Network Security, 1994(10):5, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900590.
Anonymous:1994:GCB
[95] Anonymous. The great ‘cyber-bucks’give away. Network Security, 1994(10):5, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900604.
Anonymous:1994:HSS
[96] Anonymous. High speed switchingand networking. Network Security,1994(10):5, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900612.
Anonymous:1994:CUP
[97] Anonymous. Checks for under-performing networks. Network Se-curity, 1994(10):5, October 1994.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485894900620.
Anonymous:1994:CSN
[98] Anonymous. Crime and securitynetwork. Network Security, 1994(10):6, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900639.
Anonymous:1994:EEM
[99] Anonymous. EU ends monopolies onphone networks. Network Security,1994(10):6, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 61
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900647.
Armstrong:1994:IC
[100] Lisa Armstrong. Internet copy-rights. Network Security, 1994(10):6, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900655.
English:1994:IWP
[101] Erin English. Internet white pageswith PGP. Network Security, 1994(10):7, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900663.
Cheek:1994:FTC
[102] Martin Cheek. Financial transac-tions to come onto the Internet. Net-work Security, 1994(10):7, October1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485894900671.
Armstrong:1994:PDS
[103] Lisa Armstrong. PersonaCard 100data security token. Network Security,1994(10):7–8, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589490068X.
Hancock:1994:NKF
[104] Bill Hancock. Naming is the key tothe future. Network Security, 1994
(10):8–9, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900698.
Gordon:1994:ISC
[105] Sara Gordon. IRC and security —can the two co-exist? Network Se-curity, 1994(10):10–17, October 1994.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485894900701.
Schifreen:1994:HHD
[106] Robert Schifreen. How hackers doit. Network Security, 1994(10):17–19, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[109] Wayne Madsen. The Clipper con-troversy. Network Security, 1994
REFERENCES 62
(11):6–11, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900973.
Doyle:1994:TLS
[110] Frank Doyle. Tricks of the LAN se-curity trade. Network Security, 1994(11):12–13, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900981.
Madsen:1994:OIE
[111] Wayne Madsen. Online industrialespionage. Network Security, 1994(11):14–18, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589490099X.
Lindup:1994:CIU
[112] Ken Lindup. Commercial Internetuse: a new risk? Network Security,1994(11):19, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[117] Anonymous. Cellular on the verge ofgoing mass market. Network Security,1994(12):3, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900175.
Anonymous:1994:AAA
[118] Anonymous. Axent announces acqui-sition of datamedia. Network Security,1994(12):4, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),
[122] Lisa Armstrong. Bank of America se-cures the Internet. Network Security,1994(12):4–5, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900221.
Hall:1994:LBL
[123] Phil Hall. Laser beams as a LAN con-nectivity alternative. Network Security,
1994(12):5–6, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589490023X.
Schwartau:1994:NN
[124] Winn Schwartau. To net or notto net? Network Security, 1994(12):7–11, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485894900248.
Crocker:1994:IMI
[125] Norman Crocker. An introductionto MVS integrity concerns. NetworkSecurity, 1994(12):12–16, December1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[149] Bernard P. Zajac. Book review: E-Mail Security — How To Keep YourElectronic Messages Private: BruceSchneier, published by John Wi-ley & Sons at $24.95. ISBN 0-471-05318-X. Network Security, 1995(1):18–19, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[183] Dan Thomsen. IP spoofing and ses-sion hijacking. Network Security,1995(3):6–11, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800458.
Sheffield:1995:NRPa
[184] Chris Sheffield. Network review —Part 1. Network Security, 1995(3):11–16, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580080046X.
Lindup:1995:AKM
[185] Ken Lindup. The arrest of KevinMitnick. Network Security, 1995
REFERENCES 70
(3):16–19, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[210] Stephen Saxby. G7 Summit poseschallenge to governments on publicaccess to official information. Net-work Security, 1995(4):14–15, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[218] Anonymous. Further fights againstmobile phone fraud. Network Secu-rity, 1995(5):4–5, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901981.
Anonymous:1995:IIN
[219] Anonymous. Internet interest notnecessarily business. Network Secu-rity, 1995(5):5, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589590199X.
Anonymous:1995:UFO
[220] Anonymous. US fibre-optic ca-bles set to triple. Network Secu-rity, 1995(5):5, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895902007.
Anonymous:1995:ISIa
[221] Anonymous. Internet security is-sues addressed. Network Security,1995(5):5–6, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895902015.
Anonymous:1995:SUI
[222] Anonymous. SITA unveils In-ternet service. Network Security,1995(5):6, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[226] Anonymous. Secrets for Windows, se-curity for Internet. Network Secu-rity, 1995(5):7, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895902066.
Anonymous:1995:PSN
[227] Anonymous. PCMCIA security fornotebooks and Novell LANs. Net-work Security, 1995(5):7, May 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485895902074.
English:1995:IVH
[228] Erin English. IP Version 6 holdspromise for the future. Network Secu-rity, 1995(5):7–8, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897091.
Bournellis:1995:PET
[229] Cynthia Bournellis. Putting an end totoo many passwords. Network Secu-
[256] Anonymous. Financial data backedup by ISDN. Network Security,1995(6):7, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901884.
Anonymous:1995:ISIc
[257] Anonymous. Internet security im-proved. Network Security, 1995(6):7–8, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901892.
Bucholtz:1995:NSB
[258] Chris Bucholtz. Networks sufferbackup blues. Network Security,1995(6):8, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901906.
Anonymous:1995:TSD
[259] Anonymous. The ‘TouchLock’ se-curity device. Network Security,1995(6):8, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897182.
Anonymous:1995:IGF
[260] Anonymous. Indian groups face in-creased Government electronic surveil-lance. Network Security, 1995(6):9, June 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/1353485896897194.
Riggs:1995:CPF
[261] Brian Riggs. Church puts freedomof Internet on trial. Network Secu-rity, 1995(6):10, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897212.
REFERENCES 78
Bucholtz:1995:JSH
[262] Chris Bucholtz. Judge says hackerdeserves more time. Network Secu-rity, 1995(6):10, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897200.
Bucholtz:1995:STC
[263] Chris Bucholtz. Security takescentre stage at Internet confer-ence. Network Security, 1995(6):10–11, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897224.
Kaneshige:1995:BI
[264] Tom Kaneshige. Banking on the In-ternet. Network Security, 1995(6):11, June 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/1353485896897236.
Bucholtz:1995:UWG
[265] Chris Bucholtz. US war gamesfought. Network Security, 1995(6):11–12, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897248.
Bucholtz:1995:NSF
[266] Chris Bucholtz. Network secu-rity far too lax. Network Secu-rity, 1995(6):12, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589689725X.
Hancock:1995:SSE
[267] Bill Hancock. Simple social en-gineering. Network Security, 1995(6):13–14, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897261.
Worlock:1995:CCSa
[268] David R. Worlock. The cultureof control: Safeguarding intellec-tual property in the age of net-works — Part 1. Network Security,1995(6):14–17, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897273.
Saxby:1995:NRL
[269] Stephen Saxby. Network-related law— recent decisions from USA. Net-work Security, 1995(6):18–19, June1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[274] Anonymous. Campaign to fight $3 bil-lion a year problem. Network Secu-rity, 1995(7):3, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895900977.
Anonymous:1995:SPP
[275] Anonymous. Swedish pirates pros-ecuted. Network Security, 1995(7):3, July 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/1353485895900993.
Anonymous:1995:YVH
[276] Anonymous. The year of thevirus hoax. Network Security,1995(7):3, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[278] Anonymous. Federal agency to se-cure infohighway. Network Secu-rity, 1995(7):4, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901019.
Anonymous:1995:NEV
[279] Anonymous. New electronic veri-fication standard. Network Secu-rity, 1995(7):4, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901027.
Anonymous:1995:WOP
[280] Anonymous. The worries of on-line purchasers. Network Security,1995(7):4–5, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 80
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901035.
Anonymous:1995:RN
[281] Anonymous. Radio over the Net.Network Security, 1995(7):5, July1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485895901043.
Anonymous:1995:NEO
[282] Anonymous. Novell and EUNet of-fer Internet connection. Network Se-curity, 1995(7):5, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589590106X.
Anonymous:1995:EN
[283] Anonymous. The electric network.Network Security, 1995(7):5, July1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485895901051.
Anonymous:1995:FKO
[284] Anonymous. Firewalls to keep on-line spies at bay. Network Secu-rity, 1995(7):6, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901078.
Anonymous:1995:WAV
[285] Anonymous. Windows anti-virus vir-tual device driver. Network Secu-rity, 1995(7):6, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901094.
Anonymous:1995:PGW
[286] Anonymous. Protection as good asat the Whitehouse. Network Secu-rity, 1995(7):6, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901086.
Anonymous:1995:MSE
[287] Anonymous. Message security for elec-tronic communications. Network Secu-rity, 1995(7):6–7, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[291] Chris Bucholtz. Visa and Mas-terCard settle on Internet secu-rity standard. Network Security,1995(7):8–9, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897315.
Bucholtz:1995:EEC
[292] Chris Bucholtz. Encryption ex-ports, Clipper policy criticized byconsortium. Network Security,1995(7):9, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897327.
Beseke:1995:DCI
[293] Kermit Beseke. Developing a corpo-rate Internet policy. Network Security,1995(7):10–13, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897339.
Worlock:1995:CCSb
[294] David R. Worlock. The cultureof control: Safeguarding intellec-tual property in the age of net-works — Part 2. Network Security,1995(7):13–17, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897340.
Peterson:1995:FMPa
[295] Padgett Peterson. The fortress men-tality — Part III: Tokens, one-time password devices and the Ro-man Army. Network Security, 1995(7):17–19, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[308] Anonymous. New generation net-work security product. Network Secu-rity, 1995(8):5, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 83
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895900926.
Anonymous:1995:NSE
[309] Anonymous. NetCop scans for ex-plicit material. Network Security,1995(8):5, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895900918.
Bucholtz:1995:PMP
[310] Chris Bucholtz. Pilot’s e-mail has Pen-tagon up in arms. Network Security,1995(8):5–6, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897364.
Kaneshige:1995:FSS
[311] Thomas Kaneshige. Full ser-vice security shop to ward offhackers. Network Security, 1995(8):6, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897376.
Kaneshige:1995:SSR
[312] Thomas Kaneshige. Security systemsfor the road most travelled. Net-work Security, 1995(8):6–7, August1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485896897388.
Bournellis:1995:IPD
[313] Cynthia Bournellis. Internet projectdefines middle ground. Network Secu-rity, 1995(8):7, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589689739X.
English:1995:CCJ
[314] Erin English. CyberCash and Check-free join forces. Network Security,1995(8):7–8, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897406.
Cohen:1995:IHPa
[315] Fred Cohen. Internet holes —Part 1: Internet control messageprotocol. Network Security, 1995(8):8–10, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589689742X.
English:1995:CUN
[316] Erin English. CyberAngels uniteon the net. Network Security,1995(8):8, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[318] Silvano Ongetta. Electronic data in-terchange — what are the securitymeasures? Network Security, 1995(8):16–19, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[325] Anonymous. Ties to US in-telligence for domain name as-signer. Network Security, 1995(9):4, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895900640.
Anonymous:1995:AOF
[326] Anonymous. America Online fightshackers. Network Security, 1995(9):4, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[333] Anonymous. Mobile services mar-ket set to triple. Network Security,1995(9):7, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895900713.
Anonymous:1995:MISb
[334] Anonymous. Making the Internet asafer place. Network Security, 1995(9):7, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[342] Anonymous. New secure Netproducts. Network Security, 1995(9):9, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897467.
Kaneshige:1995:FPO
[343] Thomas Kaneshige. FBI to po-lice online amidst heated contro-versy. Network Security, 1995(9):10, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897480.
Hancock:1995:ANR
[344] Bill Hancock. Attacking networkrouters. Network Security, 1995(9):11–12, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897492.
Peterson:1995:FMPb
[345] Padgett Peterson. The fortress men-tality — Part IV: Telecomputing,telecommuting and serving remote cus-tomers. Network Security, 1995(9):
REFERENCES 87
12–14, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897509.
Cohen:1995:IHPb
[346] Fred Cohen. Internet holes —Part 2: Packet fragmentation at-tacks. Network Security, 1995(9):14–16, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897510.
Herschberg:1995:ICI
[347] Bob Herschberg and Edo Roos Lind-green. Internet: a certain inse-curity. Network Security, 1995(9):16–19, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[355] Anonymous. The digital ID case.Network Security, 1995(10):4, October1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485895902635.
Anonymous:1995:MLM
[356] Anonymous. Microsoft and Lotusmake net moves. Network Security,1995(10):4–5, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[365] Cynthia Bournellis. RSA negoti-ates with firewall vendors to es-tablish VPNs. Network Security,1995(10):7, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897546.
Bucholtz:1995:NAS
[366] Chris Bucholtz. Netscape an-swers security lapses with anti-bugcontest. Network Security, 1995(10):7–8, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589689756X.
Kaneshige:1995:AIC
[367] Thomas Kaneshige. Auto in-dustry to create its own net-work. Network Security, 1995(10):8, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897571.
Hancock:1995:ECI
[368] Bill Hancock. Export of cryptographicinformation from the US: a brief lookat the problems. Network Security,1995(10):9–11, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897583.
Cohen:1995:IHPc
[369] Fred Cohen. Internet holes — Part3: The sendmail maelstrom. NetworkSecurity, 1995(10):11–12, October1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485896897595.
Schultz:1995:NPF
[370] E. Eugene Schultz. A new perspectiveon firewalls. Network Security, 1995(10):13–17, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897601.
Banes:1995:PLN
[371] D. W. Banes. Physical layer net-work security: What your LAN cando for you. Network Security, 1995(10):17–19, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[374] Anonymous. 30 US companies lose$66 million. Network Security, 1995(11):2, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901434.
Anonymous:1995:FOW
[375] Anonymous. FBI outlines a wiretap-ping future. Network Security, 1995(11):2–3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901442.
Anonymous:1995:FFT
[376] Anonymous. Flaw in fault-tolerancesoftware. Network Security, 1995(11):3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897625.
Madsen:1995:FRC
[377] Wayne Madsen. Fortezza reaches intocivilian agencies. Network Security,1995(11):3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901450.
Anonymous:1995:CCI
[378] Anonymous. Companies crack downon Internet use. Network Security,
1995(11):3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901469.
Anonymous:1995:CISb
[379] Anonymous. Check in at Internet siteto check security. Network Security,1995(11):3–4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901477.
Anonymous:1995:WNI
[380] Anonymous. Woe is the Net, oris it? Network Security, 1995(11):4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901485.
Anonymous:1995:CWS
[381] Anonymous. Choosing a Webstandard. Network Security, 1995(11):4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901493.
Anonymous:1995:PSV
[382] Anonymous. Product scans for virusesbefore a download. Network Security,1995(11):4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901507.
REFERENCES 91
Anonymous:1995:SSN
[383] Anonymous. Single sign-on networksecurity. Network Security, 1995(11):4–5, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[385] Anonymous. Internet user authen-tication security. Network Security,1995(11):5, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901531.
Anonymous:1995:DSP
[386] Anonymous. OS/2 data securityproduct to integrate IBM’s secu-rity hooks. Network Security, 1995(11):5, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589590154X.
Browne:1995:UKL
[387] Graham Browne. Using DES with keyslonger than 56 bits. Network Security,1995(11):5–6, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897637.
Hancock:1995:RHK
[388] Bill Hancock. Recent history of knownnetwork breaches. Network Security,1995(11):6–9, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897649.
Leach:1995:SCN
[389] John Leach and Colin Brown Zergo.Security considerations of network out-sourcing. Network Security, 1995(11):10–14, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897650.
Cohen:1995:IHPd
[390] Fred Cohen. Internet holes — Part4: Network news transfer proto-col. Network Security, 1995(11):15–19, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[394] Anonymous. Police given permis-sion to tap e-mail. Network Security,1995(12):2, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[397] Anonymous. The viruses are get-ting more vicious. Network Security,1995(12):3, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901612.
Anonymous:1995:JLB
[398] Anonymous. JavaScript language be-comes a competitor. Network Security,1995(12):3, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901620.
Anonymous:1995:FVB
[399] Anonymous. First virtual bank claimsto be secure. Network Security, 1995(12):4, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485895901639.
Anonymous:1995:LDP
[400] Anonymous. Long distance phone callsvia the Internet. Network Security,1995(12):4, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[406] Erin English. IP security standardsbattle it out. Network Security, 1995
(12):6, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897686.
Cohen:1995:IHPe
[407] Fred Cohen. Internet holes — Part5a: 50 ways to attack your websystems. Network Security, 1995(12):7–11, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897704.
English:1995:EEP
[408] Erin English. Exportable en-cryption policy found ‘unaccept-able’. Network Security, 1995(12):7, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896897698.
Hancock:1995:IHR
[409] Bill Hancock. Internet hacking re-sources. Network Security, 1995(12):11–15, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[416] Anonymous. Novell’s operatingsystems forecast to remain dom-inant. Network Security, 1996(1):4, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896901567.
Anonymous:1996:FOB
[417] Anonymous. Further online bank-ing competition. Network Security,1996(1):4, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896901579.
Anonymous:1996:NEC
[418] Anonymous. The new era of ca-ble modems. Network Security, 1996(1):4–5, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896901580.
Anonymous:1996:SST
[419] Anonymous. Spec for secure trans-actions. Network Security, 1996(1):5, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[426] Thomas Kaneshige. McAfee givesthe boot to virus. Network Security,1996(1):7, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589690166X.
Kaneshige:1996:NSM
[427] Thomas Kaneshige. Network se-curity made easy with little blackbox. Network Security, 1996(1):7–8, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[429] Erin English. Lotus working on mili-tary version of Notes. Network Secu-rity, 1996(1):8, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896901695.
Cohen:1996:IHPa
[430] Fred Cohen. Internet holes — Part5b: 50 ways to attack your Websystems. Network Security, 1996(1):9–13, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800900011.
Kaneshige:1996:OSD
[431] Thomas Kaneshige. Oracle to se-cure database access over the Net.Network Security, 1996(1):9, January1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485896901701.
Hanson:1996:IAS
[432] Lesley Hanson. The impact ofATM on security in the data net-work. Network Security, 1996(1):13–17, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800900023.
Lindup:1996:HH
[433] Ken Lindup. Hackers for hire. Net-work Security, 1996(1):18, January1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
[440] Anonymous. Singapore’s serviceproviders confident of security de-spite break-in. Network Security,1996(2):4, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589690046X.
Anonymous:1996:CED
[441] Anonymous. Compress and encryptdata simultaneously. Network Security,1996(2):4–5, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900471.
Anonymous:1996:NGW
[442] Anonymous. The next Great Wallof China? Network Security,1996(2):5, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900483.
Anonymous:1996:EPP
[443] Anonymous. Extended passwordprotection for CyberGuard Fire-wall. Network Security, 1996(2):5, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900495.
Anonymous:1996:IMP
[444] Anonymous. Internet may not beprofitable. Network Security, 1996(2):5–6, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900501.
Anonymous:1996:PSP
[445] Anonymous. The promise of securephone banking. Network Security,1996(2):6, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[448] Anonymous. Humans and viruseslocked out. Network Security, 1996(2):6–7, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900549.
Sterlicchi:1996:WTI
[449] John Sterlicchi. Wayfarer turns In-ternet into LAN. Network Security,1996(2):7, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900550.
Sterlicchi:1996:NMS
[450] John Sterlicchi. New moves to stim-ulate EDI growth. Network Security,1996(2):7–8, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900562.
Sterlicchi:1996:FNF
[451] John Sterlicchi. First NT firewallsoars in. Network Security, 1996(2):8–9, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900574.
Cohen:1996:IHPb
[452] Fred Cohen. Internet holes —Part 6: Automated attack and de-
[470] Atoosa Savarnejad. IBM to de-velop secure version. Network Secu-rity, 1996(3):6, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896901300.
Cohen:1996:IHPc
[471] Fred Cohen. Internet holes — Part 7:The human side. Network Security,1996(3):7–10, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800900059.
Moyer:1996:SMF
[472] Philip R. Moyer and E. Eugene Schultz.A systematic methodology for firewallpenetration testing. Network Security,1996(3):11–18, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800900060.
Osen:1996:FIAa
[473] Janet Osen. The Freedom of In-formation Act and the 2600 Club.Network Security, 1996(3):19, March1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
3, April 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485896901774.
Anonymous:1996:NGJ
[481] Anonymous. Netscape and GE’s jointInternet venture. Network Security,1996(4):3–4, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896901798.
Anonymous:1996:NOB
[482] Anonymous. Net opened to Britishbusinesses. Network Security, 1996(4):4, April 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
[490] Atoosa Savarnejad. US company of-fers firewall challenge. Network Secu-rity, 1996(4):6–7, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896836907.
Hancock:1996:INS
[491] Bill Hancock. Improving network se-curity through port switching. Net-work Security, 1996(4):7–8, April1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485896836919.
Cohen:1996:IHPd
[492] Fred Cohen. Internet holes —Part 8: Spam. Network Security,1996(4):8–10, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896836920.
Wood:1996:ICR
[493] Charles Cresson Wood. An InternetCurmudgeon’s rants. Network Security,1996(4):10–11, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896836932.
Osen:1996:BNB
[494] Janet Osen. Bad news for bul-letin boards. Network Security, 1996(4):11–13, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 103
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896836944.
Hancock:1996:CYS
[495] Bill Hancock. Can you social en-gineer your way into your net-work? Network Security, 1996(4):14–15, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[506] Fred Cohen. Internet holes — Part9: IP address forgery and howto eliminate it. Network Security,1996(5):5–12, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589681909X.
Parker:1996:RCG
[507] Tom Parker. The role of cryptogra-phy in global communications. Net-work Security, 1996(5):13–17, May1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485896819106.
Peterson:1996:IAM
[508] A. Padgett Peterson. Internet at-tack mechanisms. Network Security,1996(5):17–19, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),
[546] Anonymous. CKS MyNet, the an-swer to single sign-on? Network Se-curity, 1996(7):7, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896901038.
Sterlicchi:1996:SFM
[547] John Sterlicchi. Security frameworkfrom Microsoft. Network Security,1996(7):7–8, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896837354.
Savarnejad:1996:RSM
[548] Atoosa Savarnejad. Revisions inSET mark advances to secure cy-berspace shopping. Network Secu-rity, 1996(7):8, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896837366.
Cohen:1996:IHPg
[549] Fred Cohen. Internet holes — Part 11:Internet lightning rods. Network Secu-rity, 1996(7):9–13, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/135348589683738X.
Kaneshige:1996:MMC
[550] Thomas Kaneshige. McAfee and Mi-crosoft clean up Internet. Network Se-curity, 1996(7):9, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896837378.
Solomon:1996:EVP
[551] Alan Solomon. The end of thevirus problem. Network Security,1996(7):13–17, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 109
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896837391.
Lindup:1996:SAW
[552] Ken Lindup. Superman is aliveand well and living in Wapping.Network Security, 1996(7):18, July1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[564] Jon David. The Internet —gateway to your information as-sets. Network Security, 1996(8):5–7, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896811524.
Hancock:1996:OSA
[565] Bill Hancock. Operating system at-tacks from network resources. Net-work Security, 1996(8):8–11, August1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/1353485896811536.
Cohen:1996:IHPh
[566] Fred Cohen. Internet holes —Part 12a: Internet incident re-sponse. Network Security, 1996(8):12–14, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[571] Anonymous. Virus fears for new op-erating systems. Network Security,1996(9):2, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900185.
Anonymous:1996:MCM
[572] Anonymous. Merge creates mega secu-rity response team. Network Security,1996(9):2–3, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900197.
Anonymous:1996:SBS
[573] Anonymous. Secure banking and shop-ping on Internet. Network Security,1996(9):3, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900203.
Anonymous:1996:ISO
[574] Anonymous. Internet security offer-ings from HP. Network Security,1996(9):3, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900215.
Anonymous:1996:ARB
[575] Anonymous. Agreement reached be-tween Microsoft and RSA. Net-work Security, 1996(9):3–4, September1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485896900227.
Anonymous:1996:NCD
[576] Anonymous. Name change for Dig-ital Pathways. Network Security,1996(9):4, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900239.
Anonymous:1996:LAW
[577] Anonymous. On-LAN authenticationfor Windows NT. Network Security,1996(9):4, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900252.
Anonymous:1996:DRR
[578] Anonymous. Digital resells Raptor’ssecurity products. Network Security,1996(9):4, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900240.
Anonymous:1996:EKE
[579] Anonymous. Encryption without keyexchange. Network Security, 1996(9):4–5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 112
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900264.
Anonymous:1996:NER
[580] Anonymous. The next Eagle fromRaptor. Network Security, 1996(9):5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896844011.
Anonymous:1996:FPM
[581] Anonymous. Further protection frome-mail viruses. Network Security,1996(9):5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896900276.
Persyn:1996:JTH
[582] Tim Persyn. Journalists take tohacking. Network Security, 1996(9):5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896900288.
Bee:1996:UGA
[583] Andrianne Bee. US government al-lows selling of strong encryption toUS clients. Network Security, 1996(9):6, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896844035.
Bee:1996:NPC
[584] Andrianne Bee. NCSA programmecertifies Web sites. Network Security,1996(9):6, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896844023.
Gordon:1996:GVS
[585] Sarah Gordon. Are good virus sim-ulators still a bad idea? NetworkSecurity, 1996(9):7–13, September1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/1353485896844047.
Cohen:1996:IHPi
[586] Fred Cohen. Internet holes —Part 12(b): Internet incident re-sponse. Network Security, 1996(9):13–17, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896844059.
Osen:1996:VMP
[587] Janet Osen. The Virtual Magistrate[Project]. Network Security, 1996(9):18, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[601] Adrianne Bee. Soon even theInternet will take American Ex-press. Network Security, 1996(10):6–7, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896826511.
Cohen:1996:IHPj
[602] Fred Cohen. Internet holes — Part13: The SYN flood. Network Security,1996(10):7–9, October 1996. CODEN
[603] Jon David. Sniffers — the wholestory. Network Security, 1996(10):9–13, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485896826535.
Osen:1996:CDAa
[604] Janet Osen. The Communications De-cency Act and the karma of chaos— Part 1. Network Security, 1996(10):13–19, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[625] Thomas Kaneshige. Vendors rallyfor answers to Panix Attacks. Net-work Security, 1996(11):8, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 117
URL http://www.sciencedirect.
com/science/article/pii/S1353485897812263.
Kaneshige:1996:MCR
[626] Thomas Kaneshige. Microsoft’s cat-apult raises NT firewall bar. Net-work Security, 1996(11):8–9, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485897812275.
David:1996:FPI
[627] Jon David. The future of PGP onthe Internet. Network Security, 1996(11):9–12, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897812287.
Osen:1996:CDAb
[628] Janet Osen. The CommunicationsDecency Act — Part 2: The lan-guage of the Communications De-cency Act. Network Security, 1996(11):12–18, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[635] Anonymous. Internet shopping se-cured by SET for Taiwanese. Net-work Security, 1996(12):3, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485896900756.
Anonymous:1996:HET
[636] Anonymous. Hardware encryptiontechnology complies with encryptionregulations. Network Security, 1996(12):4, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900768.
Anonymous:1996:ECP
[637] Anonymous. Extending copyrightprotection for the Internet. Net-work Security, 1996(12):4, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348589690077X.
Anonymous:1996:IBU
[638] Anonymous. Increase in business usersneeding the Internet. Network Security,1996(12):4–5, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[643] Anonymous. Electronic privacy de-vice from Harris. Network Security,1996(12):6, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900835.
Anonymous:1996:NSS
[644] Anonymous. New software secu-rity token. Network Security, 1996
REFERENCES 119
(12):6, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900847.
Anonymous:1996:PEB
[645] Anonymous. Protection for elec-tronic business communications. Net-work Security, 1996(12):6–7, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485896900859.
Anonymous:1996:ISW
[646] Anonymous. Internet security forWindows NT environments. Net-work Security, 1996(12):7, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485896900860.
Madsen:1996:CCL
[647] Wayne Madsen. Congressional Com-mittee looks at US encryption pol-icy. Network Security, 1996(12):7–8, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485896900872.
Cohen:1996:MNS
[648] Fred Cohen. Managing network se-curity — Part 1: How good do youhave to be? Network Security, 1996(12):9–11, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800900072.
David:1996:AI
[649] Jon David. Auditing the Inter-net. Network Security, 1996(12):11–14, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800900084.
Gordon:1996:RWA
[650] Sarah Gordon and Richard Ford. Realworld anti-virus product reviews andevaluations — Part 1. NetworkSecurity, 1996(12):14–18, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[653] Anonymous. Vulnerabilities in SGIIRIX. Network Security, 1997(1):2, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 120
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897834885.
Anonymous:1997:DSA
[654] Anonymous. Denial of service at-tack via ping. Network Security,1997(1):3, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[661] Anonymous. The season for virushoaxes. Network Security, 1997(1):5, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[667] Anonymous. Security for vulnerablehigh speed networks. Network Secu-rity, 1997(1):7, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897835039.
Huynh:1997:PCW
[668] Danthanh Huynh. Professor criti-cizes Web security. Network Secu-rity, 1997(1):7, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897835027.
Cohen:1997:MNSa
[669] Fred Cohen. Managing network secu-rity — Part 2: Where should we con-centrate protection? Network Security,1997(1):8–11, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897835052.
Gordon:1997:RWA
[670] Sarah Gordon and Richard Ford.Real world anti-virus product reviewsand evaluations — Part 2. Net-work Security, 1997(1):11–18, January1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[701] Roy Szweda. NCSA supports newTIS ForceField. Network Security,1997(3):4–5, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897830383.
Savarnejad:1997:ILS
[702] Atoosa Savarnejad. IBM launches Se-cureWay. Network Security, 1997(3):5, March 1997. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485897830395.
Savarnejad:1997:ERS
[703] Atoosa Savarnejad. eTrust to roll outin second quarter. Network Security,1997(3):5–6, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897830401.
Hancock:1997:UCE
[704] Bill Hancock. The US crypto-graphic export debate — roundfive? Network Security, 1997(3):6–7, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897830413.
Cohen:1997:MNSc
[705] Fred Cohen. Managing network se-curity — Part 4: Integrity first,usually. Network Security, 1997(3):8–10, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897830425.
Osen:1997:MMM
[706] Janet Osen. The medium is themessage: a media specific anal-ysis of the Communications De-cency Act. Network Security, 1997(3):10–16, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897830437.
Osen:1997:WMT
[707] Janet Osen. For whom the mo-dem tolls: The travails of Amer-ica Online. Network Security, 1997(3):17–19, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[723] Atoosa Savarnejad. Having your cook-ies and eating them too. Network Secu-rity, 1997(4):6–7, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897800049.
Savarnejad:1997:ITS
[724] Atoosa Savarnejad. IBM and TISstrike an agreement. Network Secu-rity, 1997(4):7–8, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897800050.
Savarnejad:1997:CAI
[725] Atoosa Savarnejad. Cisco al-lies with industry leaders for secu-rity initiative. Network Security,1997(4):8, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897800062.
Moyer:1997:EFI
[726] Philip R. Moyer. Enhanced fire-wall infrastructure testing method-ology. Network Security, 1997(4):9–15, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897800074.
Cohen:1997:MNSd
[727] Fred Cohen. Managing network se-curity — Part 5: Risk managementor risk analysis. Network Security,
REFERENCES 128
1997(4):15–19, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[730] Anonymous. Natural language servicelibraries vulnerability. Network Secu-rity, 1997(5):2–3, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897856887.
Anonymous:1997:JAS
[731] Anonymous. Java applets that stealcomputer cycles. Network Secu-rity, 1997(5):3, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897856905.
Anonymous:1997:VPA
[732] Anonymous. Vulnerabilities in plug-gable authentication module. Net-
work Security, 1997(5):3, May 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485897856899.
Anonymous:1997:HPW
[733] Anonymous. High profile Web siteswarrant high security. Network Secu-rity, 1997(5):3–4, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897856917.
Anonymous:1997:NSS
[734] Anonymous. NT systems shut downby Telnet hack. Network Secu-rity, 1997(5):4, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[750] Charlie Breitrose. Hackers hit ISPsby the dozens. Network Secu-rity, 1997(5):9, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900489.
Savarnejad:1997:ANS
[751] Atoosa Savarnejad. Another NT secu-rity hole discovered. Network Security,1997(5):10–11, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900507.
Capen:1997:CPA
[752] Ian Capen. Check Point announces se-curity software alliance. Network Secu-rity, 1997(5):11, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900519.
Anonymous:1997:CTL
[753] Anonymous. To catch a thief. . . unmasking the telecoms fraud-ster. Network Security, 1997(5):12–13, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900520.
Cohen:1997:MNSe
[754] Fred Cohen. Managing networksecurity — Part 6: Computergames and network security man-agement. Network Security, 1997(5):14–18, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900532.
Lindup:1997:WLM
[755] Ken Lindup. Would Lenin make agood security officer? Network Secu-rity, 1997(5):19, May 1997. CODEN
[761] Anonymous. Internet is on its own.Network Security, 1997(6):4, June1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[786] Anonymous. AOL users hit furtherproblems with hackers. Network Se-curity, 1997(7):6, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897898716.
Szweda:1997:STF
[787] Roy Szweda. Sun takes on Feds over USencryption regulations. Network Secu-rity, 1997(7):6, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897898704.
Breitrose:1997:MJW
[788] Charlie Breitrose. Microsoft joins Websecurity consortium. Network Secu-rity, 1997(7):6–7, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897898728.
Szweda:1997:HFS
[789] Roy Szweda. Holographic finger-print security device. Network Secu-rity, 1997(7):7, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897898741.
Anonymous:1997:UEL
[790] Anonymous. US export licence for128-bit encryption for Microsoft. Net-work Security, 1997(7):7, July 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348589789873X.
Szweda:1997:ESW
[791] Roy Szweda. Encryption softwarefor Windows. Network Security,1997(7):8, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897898777.
Anonymous:1997:SPO
[792] Anonymous. SessionWall-3 protects or-ganizations from abuse. Network Se-curity, 1997(7):8, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897898765.
Anonymous:1997:EIM
[793] Anonymous. Enhancements to im-prove model for signing Internet code.
[808] Anonymous. Bank of Ireland usesSET first in Europe. Network Secu-rity, 1997(8):5, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[814] Anonymous. Global public key se-curity for PCs. Network Security,1997(8):7, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897832382.
Szweda:1997:SCU
[815] Roy Szweda. Secure Computing un-veils NT firewall. Network Security,1997(8):7, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[817] Fred Cohen. Managing network se-curity — Part 9: Penetration test-ing? Network Security, 1997(8):12–15, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897832400.
Shaw:1997:VVA
[818] Andrew Shaw. Voice verification —authenticating remote users over thetelephone. Network Security, 1997(8):16–18, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897832412.
Schultz:1997:BRIb
[819] E. Eugene Schultz. Book re-view: Intranet firewalls: ScottFuller and Kevin Pagan, VentanaPress, 1997. Network Security,1997(8):19, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[824] Roy Szweda. AT&T sues Con-nect America and others for Inter-net scam. Network Security, 1997(9):3, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589790012X.
Anonymous:1997:FRE
[825] Anonymous. Further relaxing ofexport regulations makes Internetmore secure. Network Security, 1997(9):3, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900131.
Szweda:1997:CAR
[826] Roy Szweda. CNN asked to re-move Web link. Network Security,1997(9):4, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[835] Charlie Breitrose. Distributing en-crypted messages more securely. Net-work Security, 1997(9):7, September1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348589780253X.
Cohen:1997:MNSi
[836] Fred Cohen. Managing network se-curity — Part 10: Change yourpassword. Network Security, 1997(9):8–11, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897802541.
Osen:1997:BBF
[837] Janet Osen. In the battle of thebits — final score: Internet 1,Congress 0. Network Security, 1997(9):12–16, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897802553.
REFERENCES 140
Schwartau:1997:WEIa
[838] Winn Schwartau. What exactlyis information warfare? — Part1. Network Security, 1997(9):17–19, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[844] Roy Szweda. CompuServe barbe-cues spam. Network Security, 1997(10):4, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900982.
Szweda:1997:ECF
[845] Roy Szweda. Encrypted communica-tions frustrate FBI. Network Security,1997(10):4, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900994.
Anonymous:1997:ESP
[846] Anonymous. Every Swede to have per-sonal e-mail address. Network Security,1997(10):4–5, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897901008.
Anonymous:1997:CSI
[847] Anonymous. Completely secure In-ternet connection on offer. Net-
[848] Anonymous. Internet security for busi-ness to business applications. Net-work Security, 1997(10):5, October1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485897901021.
Anonymous:1997:JAR
[849] Anonymous. Java applets run froma ‘cage’. Network Security, 1997(10):5–6, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897901033.
Anonymous:1997:MLE
[850] Anonymous. Military-level en-cryption for all data transmis-sions. Network Security, 1997(10):6, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897901045.
Breitrose:1997:VEM
[851] Charlie Breitrose. Virtual enve-lope for e-mail. Network Security,1997(10):6, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897901057.
Anonymous:1997:HPS
[852] Anonymous. High performance so-lution to IP security needs. Net-work Security, 1997(10):6–7, October1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485897901069.
Anonymous:1997:JLS
[853] Anonymous. JCP launches se-cure Internet transactions proto-col. Network Security, 1997(10):7–8, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897857327.
Wehde:1997:NFB
[854] E. D. Wehde. Netscape fixesbugs. Network Security, 1997(10):8, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897857339.
Wehde:1997:MHB
[855] E. D. Wehde. Microsoft helpsbanks. Network Security, 1997(10):8–9, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897857340.
Wehde:1997:UGT
[856] E. D. Wehde. US gets tough onencryption. Network Security, 1997(10):9–10, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 142
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897857352.
Schultz:1997:HPT
[857] Eugene Schultz. Hackers and pen-etration testing. Network Security,1997(10):10, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897857364.
Lindup:1997:TOL
[858] Ken Lindup. Take one largebomb. Network Security, 1997(10):10–11, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897857376.
Schwartau:1997:WEIb
[859] Winn Schwartau. What exactlyis information warfare? — Part2. Network Security, 1997(10):12–16, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897857388.
Cohen:1997:MNSj
[860] Fred Cohen. Managing network se-curity — Part 11: To outsourceor not to outsource, that is thequestion! Network Security, 1997(10):17–19, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[876] Anonymous. Encryption for Win-dows 95. Network Security, 1997(11):7, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900751.
Anonymous:1997:AMS
[877] Anonymous. Applet ManagementSystem for secure Java implemen-tation. Network Security, 1997(11):7, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900763.
Rees:1997:AGO
[878] Frank Rees. Australian Governmentobstructs the export of revolutionaryencryption. Network Security, 1997(11):7–8, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897900775.
Cohen:1997:MNSk
[879] Fred Cohen. Managing network se-curity — Part 13: The network se-curity game. Network Security, 1997(11):9–11, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589787328X.
Schwartau:1997:WEIc
[880] Winn Schwartau. What exactlyis information warfare? — Part3. Network Security, 1997(11):12–18, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897873291.
Dwan:1997:BRW
[881] Berni Dwan. Book review: Web psy-chos, stalkers and pranksters how toprotect yourself in cyberspace: Banks,Michael A., Coriolis Group Books,$24.99. Network Security, 1997(11):19–20, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[937] Fred Cohen. Managing networksecurity — the management offear. Network Security, 1998(2):7–9, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897831340.
Wright:1998:LPK
[938] Marie A. Wright. A look at publickey certificates. Network Security, 1998(2):10–13, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897831352.
Wood:1998:ECI
[939] Charles Cresson Wood. Essentialcontrols for Internet electronic com-merce. Network Security, 1998(2):13–18, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485897831364.
Miller:1998:SSW
[940] Nigel Miller and Claire Frater. Shet-land squabbles or worldwide wran-gles? Network Security, 1998(2):18–19, February 1998. CODEN
[1001] Anonymous. Vulnerability found inAdvanced File System Utility. Net-work Security, 1998(6):3, June 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485898900022.
Anonymous:1998:MWS
[1002] Anonymous. More Web sites vul-nerable to hackers. Network Secu-rity, 1998(6):3–4, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1021] Wayne Madsen. Encryption legis-lation and policy. Network Secu-rity, 1998(7):6–7, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898800056.
Madsen:1998:NCK
[1022] Wayne Madsen. NAFTA has cryptokey recovery agenda. Network Secu-rity, 1998(7):7–8, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898900411.
Cohen:1998:MNSg
[1023] Fred Cohen. Managing networksecurity: How does a typical ITaudit work? Network Security,1998(7):8–11, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898800068.
Rawlings:1998:ECIa
[1024] Jane Rawlings. Electronic commerceon the Internet — Part 1. Net-work Security, 1998(7):11–14, July1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348589880010X.
Lau:1998:MFSb
[1025] Oliver Lau. Meta-firewall: a sixthgeneration firewall — Part 2. Net-work Security, 1998(7):14–19, July1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1036] Wayne Madsen. Crypto politics heat-ing up. Network Security, 1998(8):5–6, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898800706.
Wehde:1998:MBE
[1037] Ed Wehde. Moves to break en-cryption deadlock. Network Security,1998(8):6–7, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898800718.
Gengler:1998:CFA
[1038] Barbara Gengler. CIA fears Amer-ica is vulnerable. Network Security,1998(8):7, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589880072X.
Rees:1998:CCA
[1039] Frank Rees. Computer crime andairforce information systems. Net-work Security, 1998(8):7–9, August1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485898800731.
Cohen:1998:MNSh
[1040] Fred Cohen. Managing networksecurity: The seedy side of se-curity. Network Security, 1998(8):9–13, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898800743.
Hancock:1998:UNH
[1041] Bill Hancock. Using network hack-ing techniques to disrupt military op-erational networks. Network Security,1998(8):13–17, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898800755.
Rawlings:1998:ECIb
[1042] Jane Rawlings. Electronic com-merce on the Internet — Part2. Network Security, 1998(8):17–19, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1054] Dario Forte. Guaranteeing thesafety of a network beyond the fire-wall. Network Security, 1998(9):12–16, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898800159.
Schultz:1998:PMN
[1055] E. Eugene Schultz and Philip C. Cox.Putting the Mime name vulnerabil-ity in outlook and messenger in per-spective. Network Security, 1998(9):16–19, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1058] Anonymous. US finally relaxes en-cryption policies. Network Security,1998(10):2–3, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898901817.
Anonymous:1998:HSP
[1059] Anonymous. Hit squad put ontrail of hackers. Network Security,1998(10):3, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1061] Anonymous. Company acquisi-tion to provide network protec-tion. Network Security, 1998(10):3–4, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1070] Barbara Gengler. The Vulnerabil-ity Engine. Network Security, 1998(10):7, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898901933.
Gengler:1998:NIS
[1071] Barbara Gengler. New Internet se-curity standard. Network Security,1998(10):7–8, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1074] Marie A. Wright. The ellip-tic curve cryptosystem: a synop-sis. Network Security, 1998(10):14–17, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876035.
Hancock:1998:SIN
[1075] Bill Hancock. Skills inventory fornetwork management. Network Se-curity, 1998(10):17–19, October 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1077] Anonymous. Simple lessons are thehardest to learn. Network Security,1998(11):2, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898900435.
Szweda:1998:CAF
[1078] Roy Szweda. China arrests first on-line bank robbers. Network Security,1998(11):2, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898900447.
Anonymous:1998:USP
[1079] Anonymous. Untrusted scripted pastein Internet Explorer 4.01. Net-work Security, 1998(11):2–3, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1086] Anonymous. Digital signatures incor-porated into electronic forms. Net-work Security, 1998(11):5, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485898900526.
Anonymous:1998:PED
[1087] Anonymous. Protection for electronicdocuments. Network Security, 1998(11):5–6, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898900538.
Anonymous:1998:LEE
[1088] Anonymous. Link encryptor with elec-tronically loadable algorithms. Net-work Security, 1998(11):6, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348589890054X.
Anonymous:1998:NSE
[1089] Anonymous. NT security en-hanced. Network Security, 1998(11):6–7, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898900551.
Szweda:1998:MMS
[1090] Roy Szweda. Micro-miniature sili-con lock makes computers ‘hacker-proof’. Network Security, 1998(11):7–8, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 167
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485898900563.
Cohen:1998:MNSk
[1091] Fred Cohen. Managing network secu-rity: The real Y2K issue. NetworkSecurity, 1998(11):8–11, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800876059.
Hancock:1998:INS
[1092] Bill Hancock. Improving net-work security through port switch-ing. Network Security, 1998(11):12–13, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876060.
Osen:1998:TSJ
[1093] Janet Osen. The thorny side of ju-risdiction and the Internet. NetworkSecurity, 1998(11):13–17, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800876072.
Osen:1998:SBC
[1094] Janet Osen. Singing the blues: Thecase of the ‘little’ Blue Note. NetworkSecurity, 1998(11):18–19, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1115] Fred Piper and Michael Walker. Cryp-tographic solutions for voice telephonyand GSM. Network Security, 1998(12):14–19, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1130] Barbara Gengler. Security guide-lines released. Network Security,1999(1):7–8, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589990199X.
Hancock:1999:ANR
[1131] Bill Hancock. Attacking networkrouters. Network Security, 1999(1):8–9, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899800014.
Tantum:1999:LRIa
[1132] Mark Tantum and Touche Ross. Le-gal responsibility of Internet serviceproviders: Part 1. Network Security,1999(1):10–15, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899800026.
Cohen:1999:MNSa
[1133] Fred Cohen. Managing network se-curity: Anatomy of a successful so-phisticated attack. Network Security,1999(1):16–19, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1143] Anonymous. Fraud on the In-ternet reduced. Network Security,1999(2):5, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900466.
Gengler:1999:NAG
[1144] Barbara Gengler. Network Associatesgets contract. Network Security, 1999(2):5–6, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900478.
Wehde:1999:ASG
[1145] Ed Wehde. ATM security getsbetter. Network Security, 1999(2):6, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589990048X.
Hancock:1999:ARN
[1146] Bill Hancock. Assessing and reduc-ing network risk. Network Security,1999(2):7–8, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 173
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800239.
Hancock:1999:NSU
[1147] Bill Hancock. Network security: Theunsolved mystery. Network Security,1999(2):9–11, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800240.
Cohen:1999:MNSb
[1148] Fred Cohen. Managing network se-curity: Returning fire. Network Se-curity, 1999(2):11–15, February 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800800252.
Tantum:1999:LRIb
[1149] Mark Tantum and Touche Ross. Le-gal responsibility of Internet serviceproviders: Part 2. Network Secu-rity, 1999(2):15–19, February 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1157] Anonymous. EU called to peti-tion against unwanted e-mail. Net-work Security, 1999(3):4–5, March1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348589990017X.
Anonymous:1999:UGH
[1158] Anonymous. UK to get a head start inthe digital marketplace. Network Secu-rity, 1999(3):5, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1191] Nigel Miller. Pirates and casualcopiers: how to protect the contentof your Web site. Network Security,1999(5):13–14, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902891.
Miller:1999:MDD
[1192] Nigel Miller. $107 million damagesfor disseminating unlawful informationon a Web site. Network Security,
REFERENCES 178
1999(5):14–15, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902908.
Miller:1999:UCB
[1193] Nigel Miller. UK e-commerce bill— summary. Network Security,1999(5):15–16, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589990291X.
Miller:1999:LIL
[1194] Nigel Miller. Liability for infringementson linked sites? Network Security,1999(5):16–17, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902921.
Miller:1999:TDP
[1195] Nigel Miller. The telecommuni-cations (data protection and pri-vacy) (direct marketing) regula-tions 1998. Network Security,1999(5):17, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902933.
Hancock:1999:ECI
[1196] Bill Hancock. Export of cryptographicinformation from the USA: A brief lookat the problems. Network Security,1999(5):17–19, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1204] Anonymous. Low-cost VPN solutionfor the remote office. Network Secu-rity, 1999(6):5, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900569.
Gengler:1999:NCW
[1205] Barbara Gengler. Networking com-panies won’t make kit Y2K com-pliant. Network Security, 1999(6):5–6, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900570.
Gengler:1999:NCG
[1206] Barbara Gengler. Now cryptogra-phy gets the ‘open source’ treatment.Network Security, 1999(6):6, June1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485899900582.
Gengler:1999:CPO
[1207] Barbara Gengler. Check point out-lines VPN strategy. Network Secu-rity, 1999(6):6–7, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900594.
Gengler:1999:FAS
[1208] Barbara Gengler. Federal agency sitesstill lack privacy notices. Network Se-curity, 1999(6):7, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900600.
Cohen:1999:MNSf
[1209] Fred Cohen. Managing networksecurity: The limits of aware-ness. Network Security, 1999(6):8–10, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580080015X.
Forte:1999:FAE
[1210] Dario Forte. The future of the Ad-vanced Encryption Standard. Net-work Security, 1999(6):10–13, June1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 180
URL http://www.sciencedirect.
com/science/article/pii/S1353485800800161.
Arden:1999:YWY
[1211] Michelle J. Arden. “Are you whoyou say you are?” the finan-cial market is finding out withPKI. Network Security, 1999(6):13–16, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800173.
David:1999:VAPa
[1212] Jon David. Vulnerabilities as-sessment — Part 1. Vulnerabilitybasics. Network Security, 1999(6):16–18, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1216] Anonymous. TROJ XPLOREZIP— stripping it from your system.Network Security, 1999(7):2–3, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485899900028.
Anonymous:1999:EUD
[1217] Anonymous. EU-US data privacydispute to continue. Network Secu-rity, 1999(7):3–4, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589990003X.
Anonymous:1999:OWD
[1218] Anonymous. Online Web do-main registration protects againstcybersquatting. Network Security,1999(7):4, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900041.
Anonymous:1999:CTS
[1219] Anonymous. Companies team upto secure e-commerce in Hong Kong.Network Security, 1999(7):4, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 181
URL http://www.sciencedirect.
com/science/article/pii/S1353485899900053.
Anonymous:1999:EPFb
[1220] Anonymous. Entrust provide freePKI and multi-platform toolkitsfor download. Network Security,1999(7):4–5, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900065.
Gengler:1999:IFC
[1221] Barbara Gengler. Internet Fraud Coun-cil. Network Security, 1999(7):5, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485899900077.
Gengler:1999:T
[1222] Barbara Gengler. Twinkle. Net-work Security, 1999(7):5–6, July 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485899900089.
Wehde:1999:MSE
[1223] Ed Wehde. Military strength encryp-tion for consumers. Network Secu-rity, 1999(7):6–7, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900090.
Cohen:1999:MNSg
[1224] Fred Cohen. Managing network se-curity: Attack and defence strate-gies. Network Security, 1999(7):7–11, July 1999. CODEN
[1225] Alison Webb. Auditing NT —Part 1. Network Security, 1999(7):11–15, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800136.
Forte:1999:PSA
[1226] Dario Forte. Postfix — a se-cure alternative to Sendmail: Anew frontier in the realm of freemailers. Network Security, 1999(7):16–18, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1230] Anonymous. Denial-of-service vulner-abilities in Windows NT 4.0. Net-work Security, 1999(8):2–3, August1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485899900302.
Anonymous:1999:FPW
[1231] Anonymous. Finland paves the wayfor a digital society. Network Secu-rity, 1999(8):3, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900314.
Anonymous:1999:GMS
[1232] Anonymous. Global market for se-curity products to grow to $8 bil-lion in 2003. Network Security,1999(8):3–4, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899900326.
Anonymous:1999:CDC
[1233] Anonymous. Companies develop Chi-nese language CA. Network Secu-rity, 1999(8):4, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),
[1249] Anonymous. Wireless data encryp-tion for handhelds. Network Security,1999(9):3, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902532.
Anonymous:1999:IPSb
[1250] Anonymous. Internet postage systemlaunched in the United States. Net-work Security, 1999(9):3, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485899902544.
Anonymous:1999:CAC
[1251] Anonymous. Clinton administra-tion calls for network monitor-ing. Network Security, 1999(9):3, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902556.
Anonymous:1999:SMB
[1252] Anonymous. Six million Brazilians filetaxes over the Net. Network Security,
1999(9):4, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1254] Anonymous. Face your image on abar code. Network Security, 1999(9):4–5, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902581.
Anonymous:1999:PYN
[1255] Anonymous. Protect your networkswith data-security chips. NetworkSecurity, 1999(9):5, September 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1257] Barbara Gengler. Hewlett Packardsecurity strategy. Network Security,1999(9):6–7, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902611.
Gengler:1999:CSS
[1258] Barbara Gengler. E-commerce secu-rity study. Network Security, 1999(9):7, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899902623.
Cohen:1999:MNSi
[1259] Fred Cohen. Managing network se-curity: In your face information war-fare. Network Security, 1999(9):8–10, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800276.
Madsen:1999:SBA
[1260] Wayne Madsen. SAFE Bill “am-bushed”. Network Security, 1999(9):10–11, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
11–12, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580080029X.
Madsen:1999:SBC
[1262] Wayne Madsen. SAFE Bill clearsTelecommunications Subcommitteewith amendments. Network Secu-rity, 1999(9):13–14, September 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800800306.
Wright:1999:OP
[1263] Marie A. Wright. An overview ofPKI. Network Security, 1999(9):14–17, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800318.
Heath:1999:WSE
[1264] Guy Heath. WIPO serves evictionnotice on cyber-squatters. NetworkSecurity, 1999(9):18–19, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1268] Anonymous. Users gain root privi-lege with wu-ftpd. Network Security,1999(10):2–3, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589990171X.
Anonymous:1999:ULE
[1269] Anonymous. US lifts export curbson encryption. Network Security,1999(10):3, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899901721.
Anonymous:1999:JGS
[1270] Anonymous. Japanese group simpli-fies hacker detection. Network Security,1999(10):3, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899901733.
Anonymous:1999:CCL
[1271] Anonymous. Continuous compli-ance with legislation for UK com-panies. Network Security, 1999(10):3–4, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899901745.
Anonymous:1999:IPB
[1272] Anonymous. IBM’s PC 300PL tobecome standard technology. Net-work Security, 1999(10):4, October1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800882690.
Anonymous:1999:ISS
[1273] Anonymous. IP service switch pre-vents fragmentation. Network Security,1999(10):4, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800882707.
Gengler:1999:UAT
[1274] Barbara Gengler. US Army thinksdifferent. Network Security, 1999(10):5, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800882719.
REFERENCES 187
Wehde:1999:VWT
[1275] Ed Wehde. Vendors work towardsLAN security. Network Security, 1999(10):5–6, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800882720.
Gengler:1999:PSC
[1276] Barbara Gengler. Politicians speak outon cyberterrorism. Network Security,1999(10):6, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800882732.
Cohen:1999:MNSj
[1277] Fred Cohen. Managing network secu-rity: Security education in the infor-mation age. Network Security, 1999(10):7–10, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800882744.
Forte:1999:FST
[1278] Dario Forte. Free security tools: Prosand cons: a review of free secu-rity tools. Network Security, 1999(10):10–13, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899901757.
Hancock:1999:ANE
[1279] Bill Hancock. Auditing the net-work environment at a technical level:Why’s, how’s and aha!’s. Network
[1280] Bill Hancock. Health care and net-work security: Protecting patientprivacy. Network Security, 1999(10):17–19, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1285] Anonymous. Microsoft and Protekcollaboration meets NATO messagingstandards. Network Security, 1999(11):3, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1289] Anonymous. Secure solution for thewireless market. Network Security,1999(11):4–5, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899901320.
Gengler:1999:IS
[1290] Barbara Gengler. IPSec specifica-tion. Network Security, 1999(11):5–6, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580080001X.
Gengler:1999:SU
[1291] Barbara Gengler. SNMP up-date. Network Security, 1999(11):6, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800021.
Cohen:1999:MNSk
[1292] Fred Cohen. Managing networksecurity: The limits of cryptogra-phy. Network Security, 1999(11):7–11, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800800033.
REFERENCES 189
Wright:1999:EAE
[1293] Marie A. Wright. The evolutionof the Advanced Encryption Stan-dard. Network Security, 1999(11):11–14, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1302] Anonymous. Companies providePKI SSO integration for securebusiness. Network Security, 1999(12):3, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 190
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485899903276.
Anonymous:1999:ANZ
[1303] Anonymous. Australia and NewZealand join global security stan-dard. Network Security, 1999(12):3–4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348589990329X.
Anonymous:1999:DOO
[1304] Anonymous. Distributor offers one stopshop for smart cards. Network Security,1999(12):4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872414.
Anonymous:1999:FCP
[1305] Anonymous. Flexible copyright protec-tion for Web content. Network Security,1999(12):4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/1353485899903306.
Anonymous:1999:ARN
[1306] Anonymous. Automatic repair for net-work security holes. Network Security,1999(12):4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872426.
Anonymous:1999:SPSb
[1307] Anonymous. Secure payment solu-tion for e-commerce. Network Security,1999(12):4–5, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872438.
Gengler:1999:FPP
[1308] Barbara Gengler. The future of thepalm print. Network Security, 1999(12):5, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580087244X.
Gengler:1999:EEL
[1309] Barbara Gengler. Encryption ex-port laws. Network Security, 1999(12):5–6, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872451.
Wehde:1999:DHP
[1310] Ed Wehde. DVD hack programon Web. Network Security, 1999(12):6–7, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872463.
Cohen:1999:MNSl
[1311] Fred Cohen. Managing networksecurity: Why it was done thatway. Network Security, 1999(12):7–9, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 191
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872475.
Webb:1999:UAO
[1312] Alison Webb. User authentication: Op-tions in Oracle. Network Security, 1999(12):10–14, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872487.
Miller:1999:DLD
[1313] Nigel Miller. Deep linking — deeptrouble. Network Security, 1999(12):15–16, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800872499.
Miller:1999:ILC
[1314] Nigel Miller. Internet lotteries con-sidered — taking a spanner to themicrochip. Network Security, 1999(12):16–19, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1319] Anonymous. Secure mobile e-paymentsystem for Europe. Network Secu-rity, 2000(1):2, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1326] Barbara Gengler. JavaScript banmay happen. Network Security,2000(1):4, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800866489.
Townsend:2000:CLL
[1327] Kevin Townsend. Carraig Ltd: Latchesfor Windows. Network Security, 2000(1):5–7, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800866490.
Blatchford:2000:ISBa
[1328] Clive Blatchford. Information secu-rity, business and the Internet —Part 1. Network Security, 2000(1):8–12, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800866507.
Humphreys:2000:SW
[1329] Ted Humphreys. Signing the e-word. Network Security, 2000(1):13, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800866519.
REFERENCES 193
Barnett:2000:TCS
[1330] Steve Barnett. Top 10 challenges tosecuring a network. Network Security,2000(1):14–16, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800866520.
Boni:2000:NMO
[1331] Bill Boni. New means — oldcrimes. Network Security, 2000(1):17, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800866532.
Cohen:2000:DF
[1332] Fred Cohen. Digital forensics. Net-work Security, 2000(1):18–20, January2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1338] Anonymous. Radicchio to secure wire-less e-commerce. Network Security,2000(2):3, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800020055.
Hough:2000:AHE
[1339] Jill Hough. Adapters help to enableLAN security. Network Security, 2000(2):3, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 194
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800020079.
Anonymous:2000:HPS
[1340] Anonymous. HP provides securityfor Microsoft Web servers. Net-work Security, 2000(2):3, February 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800020067.
Wehde:2000:MBS
[1341] Ed Wehde. Microsoft to beef up SQLserver security. Network Security, 2000(2):4, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876515.
Gengler:2000:UIR
[1342] Barbara Gengler. US ISP requirespassword changes. Network Security,2000(2):4, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876527.
Gengler:2000:CPC
[1343] Barbara Gengler. Check Pointcreates broadband Internet com-pany. Network Security, 2000(2):4–5, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876539.
Wehde:2000:IME
[1344] Ed Wehde. IBM, Microsoft in encryp-tion effort. Network Security, 2000(2):5, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876540.
Schultz:2000:IDR
[1345] E. Eugene Schultz. Intrusion detec-tion revisited. Network Security, 2000(2):6–9, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876552.
Blatchford:2000:ISBb
[1346] Clive Blatchford. Information secu-rity, business and the Internet —Part 2. Network Security, 2000(2):10–14, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876564.
Boni:2000:RC
[1347] Bill Boni. The Russian connec-tion. Network Security, 2000(2):15–16, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800876576.
Anonymous:2000:CSS
[1348] Anonymous. E-commerce surveyshows that security is the greatestconcern. Network Security, 2000(2):16, February 1, 2000. CODEN
[1368] Kevin Townsend. Reflex MagneticsLtd: MailSafe. Network Security, 2000(3):9–11, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800880253.
Forte:2000:ASP
[1369] Dario Forte. Auditing and security pol-icy: The cornerstone of company infor-mation protection. Network Security,2000(3):12–13, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800880265.
Hughes:2000:ECT
[1370] John Hughes. Enabling e-commercethrough PKI. Network Security, 2000(3):14–16, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800880277.
Cohen:2000:CDa
[1371] Fred Cohen. Collaborative de-fence. Network Security, 2000(3):17–20, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800880289.
Anonymous:2000:SMW
[1372] Anonymous. ‘Screen-melting’ wormon the loose. Network Security,2000(4):1, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800040010.
Anonymous:2000:THD
[1373] Anonymous. Teenage hacker de-nies Web attacks. Network Security,2000(4):2, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800040022.
Anonymous:2000:CCS
[1374] Anonymous. Credit cards stolenthrough known weakness. NetworkSecurity, 2000(4):2, April 1, 2000.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1391] Nigel Hickson. Government sup-port for secure electronic com-merce. Network Security, 2000(4):7–10, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800886213.
Anonymous:2000:WWY
[1392] Anonymous. Where will your e-commerce disputes be resolved? Net-work Security, 2000(4):11–12, April 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800886225.
Landrok:2000:CCV
[1393] Peter Landrok. Challenging the con-ventional view of PKI: Will it re-ally work? Network Security, 2000(4):12–15, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800886237.
Cohen:2000:CDb
[1394] Fred Cohen. Countering DCAs. Net-work Security, 2000(4):15–19, April 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800886249.
Boni:2000:HCL
[1395] Bill Boni. Hackers, crackers, lawyersand other dangers. Network Security,
[1416] Anonymous. Product guarantees ori-gin of e-mail. Network Security,2000(5):7, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800050200.
Helmich:2000:PKI
[1417] Paul Helmich. Public key infrastruc-tures: a panacea solution? Net-work Security, 2000(5):8–11, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800050224.
Corell:2000:TRP
[1418] Simon Corell. Ten risks of PKI: Infavour of smart card-based PKI. Net-work Security, 2000(5):12–14, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485800050236.
Cohen:2000:EIA
[1419] Fred Cohen. Eliminating IP addressforgery — five years old and go-ing strong. Network Security, 2000(5):15–18, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800050248.
Boni:2000:MTC
[1420] Bill Boni. The more things change, themore they stay the same!: Headline:“DTI Survey Finds Most UK Compa-nies Experienced Security Breaches.”Headline: “FBI Study Finds U.S.Losses to Computer Crime Increased100%.”. Network Security, 2000(5):18–19, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1424] Anonymous. Server forced to haltand then reload. Network Security,2000(6):2–3, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1428] Sara Parker. Companies unite to se-cure EBPP market. Network Secu-rity, 2000(6):4, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060098.
Anonymous:2000:UIS
[1429] Anonymous. UK initiative to se-cure e-commerce. Network Security,2000(6):4, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060074.
Anonymous:2000:CLI
[1430] Anonymous. Convenience lost for in-creased security. Network Security,2000(6):4–5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060104.
Smith:2000:ABS
[1431] Tim Smith. Authentication by bio-metric smart card. Network Secu-rity, 2000(6):5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060116.
REFERENCES 204
Anonymous:2000:BSF
[1432] Anonymous. Backup to save filesfrom virus. Network Security, 2000(6):5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580006013X.
Anonymous:2000:CVT
[1433] Anonymous. Creation of VPN tun-nels simplified. Network Security,2000(6):5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060128.
Bunker:2000:AVT
[1434] Lucy Bunker. Anti-virus technol-ogy for Yahoo! Network Security,2000(6):5–6, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060141.
Anonymous:2000:LB
[1435] Anonymous. Love bugged! Net-work Security, 2000(6):6, June 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800060153.
Spalding:2000:DWU
[1436] Michael Spalding. Deciding whetheror not to use a third party certifi-cate authority. Network Security,2000(6):7–8, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060165.
Tobias:2000:LBD
[1437] Henk Tobias. To be or not tobe — legally binding digital cer-tificates. Network Security, 2000(6):9–11, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060177.
Venter:2000:NSI
[1438] H. S. Venter and J. H. P. Eloff.Network security: Important is-sues. Network Security, 2000(6):12–16, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060189.
Cohen:2000:WCW
[1439] Fred Cohen. Why can’t we do DNSright? Network Security, 2000(6):17–18, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060190.
Boni:2000:ODD
[1440] Bill Boni. Ode to ‘digital de-fenders’. Network Security, 2000(6):19, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800060207.
REFERENCES 205
Anonymous:2000:FFC
[1441] Anonymous. Flaw in firewall couldlead to DoS attack. Network Secu-rity, 2000(7):1, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580007001X.
Anonymous:2000:SBT
[1442] Anonymous. The Serbian BadmanTrojan. Network Security, 2000(7):1–2, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1447] Anonymous. New viruses run with-out being opened. Network Security,2000(7):4, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1458] Marie A. Wright. Virtual private net-work security. Network Security, 2000(7):11–14, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800070185.
Cohen:2000:WDI
[1459] Fred Cohen. What does it do be-hind your back? Network Security,2000(7):15–17, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 207
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800070197.
Boni:2000:WDW
[1460] Bill Boni. What to do when theworst happens! Network Security,2000(7):18–19, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1473] Anonymous. Microsoft and ISS uniteto secure ISA Server 2000. Net-work Security, 2000(8):5, August 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485800080120.
Anonymous:2000:NWS
[1474] Anonymous. New Web securitysolution. Network Security, 2000(8):5, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1479] Peter Cox. Exactly what it says on theTin . . . says who? Network Security,2000(8):8–10, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800080181.
Cohen:2000:UVB
[1480] Fred Cohen. Understanding virusesbio-logically. Network Security, 2000(8):11–16, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800080193.
Boni:2000:UMG
[1481] Bill Boni. The US mob gets savvy tocyber crime. Network Security, 2000(8):17–18, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580008020X.
Schultz:2000:BRI
[1482] E. Eugene Schultz. Book review:Intrusion Detection: Rebecca Bace[Macmillan Technical Publishing, In-dianapolis, IN, USA, ISBN 1-57870-185-6]. Network Security, 2000(8):19, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800080211.
Anonymous:2000:BIW
[1483] Anonymous. 32-bit Internet worm‘Sysid.exe’. Network Security, 2000(9):1, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800090012.
Anonymous:2000:MPT
[1484] Anonymous. Mobile phone targeted byvirus writers. Network Security, 2000(9):1–2, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1505] Barbara Gengler. US President Clin-ton signs Digital Signature Bill. Net-work Security, 2000(9):7–8, September1, 2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 212
URL http://www.sciencedirect.
com/science/article/pii/S1353485800090231.
Donnelly:2000:UNL
[1506] Allan Donnelly. US national labfights viruses. Network Security, 2000(9):8, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800090243.
Kaliski:2000:CNP
[1507] Burt Kaliski. Considerations for newpublic-key algorithms. Network Se-curity, 2000(9):9–10, September 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800090255.
Syed:2000:CLA
[1508] Furqan Syed. Children of DES: alook at the Advanced Encryption Stan-dard. Network Security, 2000(9):11–12, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800090267.
Wright:2000:IQC
[1509] Marie A. Wright. The impact ofquantum computing on cryptogra-phy. Network Security, 2000(9):13–15, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800090279.
Cohen:2000:C
[1510] Fred Cohen. Chipping. Network Se-curity, 2000(9):16–17, September 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800090280.
Boni:2000:CPC
[1511] Bill Boni. Carnivores, predators andcivil liberties. Network Security, 2000(9):18–19, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800090292.
Anonymous:2000:FSF
[1512] Anonymous. Federal security foundlacking. Network Security, 2000(10):1, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800100017.
Anonymous:2000:IIR
[1513] Anonymous. Indian IT out ofreach. Network Security, 2000(10):2, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800100029.
Anonymous:2000:ILL
[1514] Anonymous. International legisla-tion at last. Network Security, 2000(10):2, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1520] Anonymous. Music industry enlistshelp of hackers. Network Security,2000(10):4, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1530] Colin L. Bond. Big Brother has beenhere all along. Network Security, 2000(10):9, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800100194.
McDermott:2000:BTO
[1531] Paul McDermott. Building trust intoonline business. Network Security, 2000(10):10–12, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800100200.
Osen:2000:TSJ
[1532] Janet Osen. The thorny side of ju-risdiction and the Internet. NetworkSecurity, 2000(10):13–16, October 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800100212.
Cohen:2000:RR
[1533] Fred Cohen. Revisiting risk. NetworkSecurity, 2000(10):17–18, October 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800100224.
REFERENCES 215
Boni:2000:LD
[1534] Bill Boni. Lights in the dark-ness. Network Security, 2000(10):19–20, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800100236.
Anonymous:2000:MHL
[1535] Anonymous. Microsoft hacked . . .twice. Network Security, 2000(11):1–2, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1556] Jon David. The vanishing fire-wall. Network Security, 2000(11):8–11, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800850230.
Roberts:2000:TWT
[1557] Graham Roberts. Tangled Web —tales of digital crime from the shad-ows of cyberspace: Richard Power, QueCorporation, 2000. Network Security,2000(11):8, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800850229.
McDermott:2000:PFL
[1558] Paul McDermott. Personal firewalls. . . one more step towards comprehen-sive security. Network Security, 2000(11):11–14, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800850242.
Zieger:2000:BEC
[1559] Melissa Zieger. Boost in electroniccourier traffic — traditional UK couri-ers left stranded in petrol shortage:Internet proved to be best vehiclefor secure and trackable documenttransfer. Network Security, 2000(11):14–15, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800850254.
Cohen:2000:WEK
[1560] Fred Cohen. Why everything keepsfailing. Network Security, 2000(11):16–18, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800850266.
Boni:2000:MM
[1561] Bill Boni. Meteors and man-agers. Network Security, 2000(11):18–19, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1574] Anonymous. Layered system pre-ferred. Network Security, 2000(12):4, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800120124.
Madsen:2000:HCI
[1575] Wayne Madsen. Health care indus-try debate: Electronic versus digitalsignatures. Network Security, 2000(12):5, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1577] Wayne Madsen. Data protec-tion commissioners explore newground. Network Security, 2000(12):6, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580012015X.
McDermott:2000:SIN
[1578] Paul McDermott. Security in IP net-works. Network Security, 2000(12):7–9, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800120161.
Pemble:2000:WYL
[1579] Matthew Pemble. Washing yourlaundry in public — an analysis ofrecent high-publicity security inci-dents. Network Security, 2000(12):10–12, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800120173.
Kakalik:2000:PSW
[1580] John S. Kakalik and Marie A. Wright.Privacy and security in wireless com-puting. Network Security, 2000(12):
[1581] Fred Cohen. The Millennium ar-ticle — yet again!: The bots arecoming!!! The bots are com-ing!!! Network Security, 2000(12):15–18, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485800120197.
Boni:2000:TTH
[1582] Bill Boni. Tricks and treats from thehacker underground! Network Se-curity, 2000(12):18–19, December 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485800120203.
Anonymous:2001:TMC
[1583] Anonymous. Three million creditcards compromised. Network Security,2001(1):1, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1595] Jackie Groves. Security for applicationservice providers. Network Security,2001(1):6–9, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801001131.
Pemble:2001:ATC
[1596] Matthew Pemble. Always trustcontent from Microsoft Corpora-tion? Network Security, 2001(1):10–12, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801001143.
Brown:2001:VOP
[1597] Arlene Brown. VPNs: Only partof the remote access security solu-tion. Network Security, 2001(1):12–14, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801001155.
Cohen:2001:MHF
[1598] Fred Cohen. Marketing hyperbole atits finest. Network Security, 2001(1):15–17, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801001167.
REFERENCES 222
Boni:2001:YJP
[1599] Bill Boni. The year just past and theone ahead. Network Security, 2001(1):18–19, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1611] Anonymous. SCM get EMV sealof approval. Network Security, 2001(2):4, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002112.
Donnelly:2001:HRR
[1612] Allan Donnelly. How to reduce riskswith ActiveX. Network Security, 2001(2):5, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002124.
Gengler:2001:WMT
[1613] Barbara Gengler. Workplace mon-itoring tops privacy hit-list. Net-work Security, 2001(2):5–6, February 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485801002136.
Madsen:2001:CSB
[1614] Wayne Madsen. Computer securityboard criticized. Network Security,2001(2):6, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002148.
Gengler:2001:HNS
[1615] Barbara Gengler. HP and Nokiasecure wireless transactions. Net-work Security, 2001(2):7, February 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580100215X.
Anonymous:2001:AVV
[1616] Anonymous. Anti-virus vendors urgeValentine’s day caution. Network Se-curity, 2001(2):7, February 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801002161.
Roberts:2001:BRI
[1617] Graham Roberts. Book review: In-side Internet Security — What Hack-ers Don’t Want You To Know: JeffCrume, Pearson Education Limited,£29.95. Network Security, 2001(2):8, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002173.
REFERENCES 224
Forte:2001:PPF
[1618] Dario Forte. Peer-to-peer file sharingis here to stay: Napster’s definitiveshift to a pay service means more prob-lems for system administrators. Mean-while, other similar systems are gain-ing a foothold. Network Security, 2001(2):9–11, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002185.
Pemble:2001:WHI
[1619] Matthew Pemble. W(h)ither regu-lation? Network Security, 2001(2):11–12, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002197.
Hruska:2001:VPG
[1620] Jan Hruska. Is the virus problem get-ting worse? Network Security, 2001(2):13–16, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002203.
Cohen:2001:TYS
[1621] Fred Cohen. Testing your secu-rity defence by breaking in?: Maybenot. Network Security, 2001(2):16–18, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801002215.
Boni:2001:BS
[1622] Bill Boni. Balancing the scales. Net-work Security, 2001(2):19–20, February1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1627] Anonymous. McDonalds in BIND ex-ploitation. Network Security, 2001(3):3, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580100304X.
Anonymous:2001:Bc
[1628] Anonymous. In brief. Network Secu-rity, 2001(3):3, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003063.
Anonymous:2001:BPC
[1629] Anonymous. BT profits from cy-bercrime. Network Security, 2001(3):3–4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003051.
Anonymous:2001:SMS
[1630] Anonymous. Stock-market sensitivedata not secured. Network Security,2001(3):4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003075.
Anonymous:2001:ESF
[1631] Anonymous. EU says fraud hasdoubled. Network Security, 2001(3):4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003087.
Anonymous:2001:UCN
[1632] Anonymous. Users click on NakedWife. Network Security, 2001(3):4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003099.
Donnelly:2001:DSH
[1633] Allan Donnelly. DNS software hole al-lows Web attacks. Network Security,2001(3):5, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003105.
Anonymous:2001:SLI
[1634] Anonymous. Security left out of in-vestment decisions. Network Security,2001(3):5–6, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003117.
Gengler:2001:TCP
[1635] Barbara Gengler. Trusted computingplatform alliance. Network Security,2001(3):6, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003129.
Silver:2001:AFA
[1636] Oscar Silver. AOL files another law-suit to stop junk e-mail. Network Secu-rity, 2001(3):7, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),
[1638] Wayne Madsen. Troubled Watersat NSA. Network Security, 2001(3):8–10, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003154.
Pemble:2001:PBI
[1639] Matthew Pemble. Poking at theborders: The internationally-mindedtoad. Network Security, 2001(3):10–11, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801003166.
Cohen:2001:CSI
[1640] Fred Cohen. Corporate security in-telligence: An oxymoron? Net-work Security, 2001(3):12–17, March 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801003178.
Boni:2001:TCS
[1641] Bill Boni. The threat of cyber-sabotage: The new Internet economyhas recently seen a spate of layoffs. E-business had better watch out for theirex-technical employees — and guardagainst the potentially crippling effectsof cyber-sabotage. Network Security,2001(3):18–19, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1656] Wayne Madsen. EU and Council ofEurope showdown looming on Inter-net surveillance. Network Security,2001(4):7–8, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801004147.
Anonymous:2001:CBFa
[1657] Anonymous. Cisco e-business forum‘scared to death’. Network Security,2001(4):8–9, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801004159.
Kirkby:2001:CCW
[1658] Andrea Kirkby. Cryptographyand e-commerce: a Wiley techbrief. Network Security, 2001(4):9, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801004160.
Pemble:2001:CEW
[1659] Matthew Pemble. Confidentiality:From encryption, to where? Net-work Security, 2001(4):10–11, April 1,
[1661] Fred Cohen. To prosecute or not toprosecute? Network Security, 2001(4):15–18, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801004196.
Boni:2001:BB
[1662] Bill Boni. E-biz blitz. Network Se-curity, 2001(4):18–19, April 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801004202.
Anonymous:2001:MKS
[1663] Anonymous. My kingdom for asandbox. Network Security, 2001(4):20, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1665] Anonymous. US and China fightit out online. Network Security,2001(5):1–2, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005013.
Anonymous:2001:MPB
[1666] Anonymous. Microsoft plasters bighole in W2K. Network Security,2001(5):2, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005025.
Anonymous:2001:HGP
[1667] Anonymous. Hacking group playsPeekabooty with censorship. Net-work Security, 2001(5):2–3, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801005037.
Anonymous:2001:LVL
[1668] Anonymous. L0phtCrack v. 3.0at large. Network Security, 2001(5):3, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005049.
Anonymous:2001:Be
[1669] Anonymous. In brief. Network Secu-rity, 2001(5):3, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005074.
Anonymous:2001:VGA
[1670] Anonymous. Vigilantes to go af-ter hackers. Network Security, 2001(5):3, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005050.
Anonymous:2001:MOW
[1671] Anonymous. Microsoft offers worm tobest US customers. Network Security,2001(5):3–4, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1673] Anonymous. Medical records openbook in UK. Network Security,2001(5):4, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005098.
REFERENCES 230
Gengler:2001:GE
[1674] Barbara Gengler. UN global e security.Network Security, 2001(5):5, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1676] Wayne Madsen. Cybercrime conven-tion steams ahead. Network Secu-rity, 2001(5):6, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005128.
Pemble:2001:IBT
[1677] Matthew Pemble. The importanceof being timely. Network Security,2001(5):7–8, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580100513X.
Barber:2001:MXC
[1678] Richard Barber. Managing X-commerce: The importance ofa security-based architecture whenpreparing for e-commerce. Net-work Security, 2001(5):9–12, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485801005141.
Franklin:2001:SOS
[1679] Iain Franklin. Securing the operatingsystem: Does lesser-known mean less atrisk? Is the OS an example of securitythough obscurity? Network Security,2001(5):12–13, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005153.
Anscombe:2001:OSE
[1680] Tony Anscombe. Online secure en-terprises and the Linux effect. Net-work Security, 2001(5):14, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801005165.
Cohen:2001:NCG
[1681] Fred Cohen. The new cyber gang —a real threat profile. Network Security,2001(5):15–17, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801005177.
Boni:2001:BBS
[1682] Bill Boni. Building bridges, stand-ing guard. Network Security, 2001(5):18–19, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1686] Anonymous. NIPC is understaffedand under-performing. Network Secu-rity, 2001(6):2, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580100602X.
Anonymous:2001:MMA
[1687] Anonymous. Microsoft make anti-hacker film. Network Security, 2001(6):2, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006031.
Anonymous:2001:PKN
[1688] Anonymous. Protecting kids on the Netis political magnet. Network Security,2001(6):2–3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006043.
Anonymous:2001:GPR
[1689] Anonymous. GlobalSign to provideroot signatures online. Network Secu-rity, 2001(6):3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006055.
Anonymous:2001:Bf
[1690] Anonymous. In brief. Network Secu-rity, 2001(6):3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006080.
Anonymous:2001:FIP
[1691] Anonymous. Free international privacyguide out on Internet. Network Secu-rity, 2001(6):3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1695] Anonymous. 70% fail to secure con-fidential data. Network Security,2001(6):4, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006122.
Anonymous:2001:DIF
[1696] Anonymous. DERA issues freevirus protection. Network Security,2001(6):4, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006109.
Gengler:2001:USI
[1697] Barbara Gengler. US set to im-prove Federal Websites, establishCIO. Network Security, 2001(6):5, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006134.
Sterlicchi:2001:CSS
[1698] John Sterlicchi. CERT to sell secu-rity alerts. Network Security, 2001(6):5–6, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006146.
Donnelly:2001:FMP
[1699] Allan Donnelly. Flawed mobileprotocol delays release of stan-dard. Network Security, 2001(6):6, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1701] Anonymous. The lowdown onCISSP. Network Security, 2001(6):7, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006171.
REFERENCES 233
Pemble:2001:TIS
[1702] Matthew Pemble. In theory, itshouldn’t be difficult in practice. Net-work Security, 2001(6):7–8, June 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1704] Rob Graham. The fifth column:The biggest security threats to fi-nancial institutions may come fromwithin — whether employees cooper-ate or not. Network Security, 2001(6):12–15, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006201.
Cohen:2001:WR
[1705] Fred Cohen. The wireless revolu-tion. Network Security, 2001(6):16–17, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006213.
Boni:2001:CCC
[1706] Bill Boni. Corporations caught in thecrossfire? Network Security, 2001
[1708] Anonymous. A partly political virusproblem. Network Security, 2001(6):20, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801006237.
Anonymous:2001:SOD
[1709] Anonymous. SANS.org defaced, downfor three days. Network Security,2001(7):1, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007012.
Anonymous:2001:ATS
[1710] Anonymous. Attrition team sharesmirror’s insights. Network Security,2001(7):2, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007024.
REFERENCES 234
Anonymous:2001:WS
[1711] Anonymous. White hat sent down.Network Security, 2001(7):2–3, July 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801007036.
Anonymous:2001:NFV
[1712] Anonymous. New free vulnerabil-ity list launched. Network Security,2001(7):3, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007048.
Anonymous:2001:Bg
[1713] Anonymous. In brief. Network Secu-rity, 2001(7):3, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1715] Anonymous. Mac losing squeaky-clean image. Network Security,2001(7):3, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007061.
Anonymous:2001:EAU
[1716] Anonymous. EC asks US tokeep its spying ECHR compli-ant. Network Security, 2001(7):3–4, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007073.
Anonymous:2001:ESS
[1717] Anonymous. EU set to secure In-ternet. Network Security, 2001(7):4, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1721] Elspeth Wales. Tap-proof mobilephone is launched. Network Security,2001(7):5–6, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007139.
Gengler:2001:MRL
[1722] Barbara Gengler. Micron–Rambuslawsuit delayed. Network Security,2001(7):6, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007140.
Pemble:2001:SPA
[1723] Matthew Pemble. A sceptical pi-geon amongst the crypto cats: Re-port on the Edinburgh FinancialCryptographic Engineering Confer-ence, 2001. Network Security, 2001(7):7–9, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007152.
Barber:2001:SEP
[1724] Richard Barber. Social engineering: apeople problem? Network Security,2001(7):9–11, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007164.
Webb:2001:WAWa
[1725] Alison Webb. Why audit a Webserver?: Auditing Web servers: IIS4.0 — Part 1. Network Security, 2001(7):11–14, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007176.
Madsen:2001:PON
[1726] Wayne Madsen. Pentagon orders NSAto monitor US citizens: DoD panelrecommends Echelon be turned onUS citizens, increased domestic rolefor NSA. Network Security, 2001(7):14–16, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801007188.
Cohen:2001:MP
[1727] Fred Cohen. A matter of power. Net-work Security, 2001(7):16–18, July 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580100719X.
Boni:2001:PA
[1728] Bill Boni. The price of admis-sion. Network Security, 2001(7):18–19, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1735] Anonymous. In brief. Network Se-curity, 2001(8):3, August 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801008066.
Anonymous:2001:PNL
[1736] Anonymous. PDF no longer quiteso Peachy. Network Security, 2001(8):3–4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008054.
Anonymous:2001:WRM
[1737] Anonymous. WEP: ready in 15minutes. Network Security, 2001(8):4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008078.
Anonymous:2001:AUC
[1738] Anonymous. AI used to catch pi-rates on Net. Network Security, 2001(8):4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580100808X.
REFERENCES 237
Anonymous:2001:PCS
[1739] Anonymous. Port cloaking saveszombies. Network Security, 2001(8):4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008091.
Gengler:2001:PVS
[1740] Barbara Gengler. PoizonB0x vandal-izes security sites. Network Security,2001(8):5, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008108.
Sterlicchi:2001:CEN
[1741] John Sterlicchi. California energy net-work under attack. Network Security,2001(8):5–6, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1743] Matthew Pemble. Yet anotherparadigm!: Trust: a web, a hierarchy,or something else? Network Security,2001(8):7–9, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008133.
Forte:2001:WFW
[1744] Dario Forte. Web filtering: Where, howand why: Control of Internet use: someconsiderations about the implicationsof this type of control in the light of theItalian experience. Network Security,2001(8):9–10, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008145.
Schwartau:2001:NSA
[1745] Winn Schwartau. Network secu-rity: It’s about time: An offer fora metric. Network Security, 2001(8):11–13, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008157.
Madsen:2001:FCS
[1746] Wayne Madsen. FBI at centre stageof Code Red. Network Security, 2001(8):14–15, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801008169.
Boni:2001:FCW
[1747] Bill Boni. Fish, CHIPS andworms. Network Security, 2001(8):15–17, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1749] Anonymous. It’s time to take pornseriously! Network Security, 2001(8):20, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1763] Andrea Kirkby. Book review: Inter-net Trust And Security: James Es-singer, Addison Wesley, £31.99. Net-work Security, 2001(9):6, September 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801009138.
Farrell:2001:XPW
[1764] Stephen Farrell and Michael Zolotarev.XML and PKI — What’s thestory? Network Security, 2001(9):7–10, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580100914X.
Webb:2001:WAWb
[1765] Alison Webb. Why audit a Webserver?: Auditing Web servers: IIS 4.0— Part 2. Network Security, 2001(9):11–14, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801009151.
Pemble:2001:CHC
[1766] Matthew Pemble. Crying ‘havoc’,crying ‘wolf’ or just howling at theMoon? Network Security, 2001(9):14–16, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801009163.
Cohen:2001:BSB
[1767] Fred Cohen. The best security bookever written. Network Security, 2001
[1768] Bill Boni. Creating a global consen-sus against cybercrime. Network Se-curity, 2001(9):18–19, September 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801009187.
Anonymous:2001:WIB
[1769] Anonymous. When ignorance is notbliss! Network Security, 2001(9):20, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1787] J. J. Gray. What we can learnabout malicious mobile code. NetworkSecurity, 2001(10):9–10, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801010170.
Wright:2001:AES
[1788] Marie A. Wright. The AdvancedEncryption Standard. Network Se-curity, 2001(10):11–13, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801010182.
David:2001:IOI
[1789] Jon David. The ins and outs of intru-sion detection. Network Security, 2001(10):13–15, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801010194.
Cohen:2001:DWI
[1790] Fred Cohen. The DMCA: Whyit is bad for InfoSec profession-als. Network Security, 2001(10):16–18, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801010200.
Boni:2001:TFW
[1791] Bill Boni. The towers fall and warbegins. Network Security, 2001(10):18–19, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801010212.
Anonymous:2001:ARL
[1792] Anonymous. Abstracts of recent lit-erature. Network Security, 2001(10):20, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1802] Anonymous. IAAC and ICAF joinup thinking. Network Security, 2001(11):4, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011096.
Anonymous:2001:WFL
[1803] Anonymous. What have firms learntpost 9/11? Network Security, 2001(11):4, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011102.
Gengler:2001:XNT
[1804] Barbara Gengler. XP a nationalthreat? Network Security, 2001(11):5, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011114.
Gengler:2001:PPS
[1805] Barbara Gengler. Princeton pollshows 56% favour crypto regula-tions. Network Security, 2001(11):5–6, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 244
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011126.
Gengler:2001:CGI
[1806] Barbara Gengler. CATT — gov-ernment and industry team up inUS. Network Security, 2001(11):6, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011138.
Szerszen:2001:WNN
[1807] Dennis Szerszen. Wireless network-ing: Nirvana or nightmare? NetworkSecurity, 2001(11):7, November 30,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580101114X.
Pemble:2001:MR
[1808] Matthew Pemble. A Moment’s re-flection. Network Security, 2001(11):8–10, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011151.
Hunter:2001:BBP
[1809] Philip Hunter. Barclays Bank pros-ecutes rather than covering up.Network Security, 2001(11):10–11,November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1811] Dario Forte. Can worms begood? Network Security, 2001(11):14–15, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011187.
White:2001:FPW
[1812] Ben White. Fighting the porn war:The rise of email pornography in theworkplace. Network Security, 2001(11):16–17, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011199.
Cohen:2001:SWU
[1813] Fred Cohen. Should we use de-ception as an InfoSec defence?Network Security, 2001(11):18–19,November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801011205.
Anonymous:2001:DWH
[1814] Anonymous. Do women hack?: Haxorchicks are go. Network Security, 2001(11):20, November 30, 2001. CODEN
[1820] Anonymous. playboy.com data probedby hackers. Network Security, 2001(12):2–3, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012053.
Anonymous:2001:SDA
[1821] Anonymous. DoS set to double againin 2002. Network Security, 2001(12):3, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012065.
Anonymous:2001:TSD
[1822] Anonymous. ‘Tis the season to de-fraud. Network Security, 2001(12):3, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012077.
Anonymous:2001:Bl
[1823] Anonymous. In brief. NetworkSecurity, 2001(12):3, December 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801012090.
REFERENCES 246
Anonymous:2001:MDW
[1824] Anonymous. MS doesn’t want to‘cry wolf’. Network Security, 2001(12):3–4, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012089.
Anonymous:2001:IIB
[1825] Anonymous. IBM invests in bio-metrics. Network Security, 2001(12):4, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012107.
Anonymous:2001:CTY
[1826] Anonymous. CCTV through yourPC or PDA. Network Security, 2001(12):4, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012119.
Gengler:2001:UGB
[1827] Barbara Gengler. US Government tobuild own Net. Network Security, 2001(12):5, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1829] John Sterlicchi. IBM establishes dataprivacy groups. Network Security, 2001(12):6, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012144.
Madsen:2001:PPN
[1830] Wayne Madsen. Pentagon pushes na-tional identification card for US. Net-work Security, 2001(12):6, December 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801012156.
Duke:2001:HM
[1831] David Duke. Hack of the month. Net-work Security, 2001(12):7, December 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485801012168.
Pemble:2001:NDN
[1832] Matthew Pemble. Nightmare on theDot-NET, Part II (Bill’s back). Net-work Security, 2001(12):8–9, December1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580101217X.
Packer:2001:PNN
[1833] Ryon Packer. Protecting thenetwork: NIDS: the logical firststep in intrusion detection deploy-ment. Network Security, 2001(12):
[1834] Dario Forte. Fragmentation at-tacks: Protection tools and tech-niques: Called “true preliminariesto denial-of-service”, IpFrags are atough nut to crack for some fire-walls and intrusion detection sys-tems. Network Security, 2001(12):12–13, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012193.
Jones:2001:WHS
[1835] Deri Jones. Web hosting — the secu-rity risks. Network Security, 2001(12):14–15, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580101220X.
Palmer:2001:RYP
[1836] Chloe Palmer. Review of theyear, Part I: 2001: a game of twohalves. Network Security, 2001(12):15–17, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485801012211.
Boni:2001:CTC
[1837] Bill Boni. Cyber-terrorists and counterspies. Network Security, 2001(12):17–18, December 1, 2001. CODEN
[1838] Fred Cohen. The world doesn’t wantto be fixed. Network Security, 2001(12):19, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1846] Anonymous. US “somewhat con-cerned” about Web security. Net-work Security, 2002(1):3, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580200106X.
Anonymous:2002:Ba
[1847] Anonymous. In brief. Network Se-curity, 2002(1):3, January 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802001083.
Anonymous:2002:IGT
[1848] Anonymous. IDSs generate too manyfalse alarms. Network Security, 2002(1):3–4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802001071.
Anonymous:2002:BBW
[1849] Anonymous. Biometrics boom in wakeof terror. Network Security, 2002(1):4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802001095.
Anonymous:2002:IMW
[1850] Anonymous. IT managers work toohard say Intel. Network Security,2002(1):4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1852] Anonymous. Supermarket has securityfree e-warehouse. Network Security,2002(1):4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802001125.
Gengler:2002:UVV
[1853] Barbara Gengler. Unix vendors vul-nerable to malicious attacks. Net-work Security, 2002(1):5, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802001137.
Gengler:2002:UAC
[1854] Barbara Gengler. US Army choosesSmartcard technology. Network Se-curity, 2002(1):5–6, January 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1856] David Duke. Hack of the month. Net-work Security, 2002(1):7, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802001162.
Palmer:2002:RYP
[1857] Chloe Palmer. Review of the year,Part II: 2001: a game of twohalves. Network Security, 2002(1):8–10, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802001174.
Pemble:2002:HSI
[1858] Matthew Pemble. Be happy? Share in-formation?? Network Security, 2002(1):10–11, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802001186.
Pollino:2002:HSO
[1859] David Pollino. How to secure anOffice wireless network. NetworkSecurity, 2002(1):12–13, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802001198.
Anonymous:2002:RCS
[1860] Anonymous. Ringing the changesin the security cupboard. NetworkSecurity, 2002(1):14–16, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802001204.
Cohen:2002:EIW
[1861] Fred Cohen. The end of the Internetas we know it. Network Security, 2002(1):16–18, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 250
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802001216.
Boni:2002:GR
[1862] Bill Boni. The Golden Rule? Net-work Security, 2002(1):18–19, January1, 2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802001228.
Anonymous:2002:POC
[1863] Anonymous. 2002: a privacy odyssey:Customer: Hello, I’d like to up-grade my life. Can I have some pri-vacy please?”. Network Security, 2002(1):20, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1874] Anonymous. Users unable to downloadsecurity patches. Network Security,2002(2):4, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802002106.
Sellors:2002:VH
[1875] Nick Sellors. Viral hoaxes. Net-work Security, 2002(2):5, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802002118.
Anonymous:2002:PLU
[1876] Anonymous. Passwords linked to user‘obsessions’. Network Security, 2002(2):6–7, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580200212X.
White:2002:DSB
[1877] Paul White. Data security: the backupbackdoor. Network Security, 2002(2):8–9, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802002131.
Anonymous:2002:SSG
[1878] Anonymous. Security spending togrow in 2002. Network Security, 2002(2):9, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802002143.
Forte:2002:NWE
[1879] Dario Forte. New worm experiments —a real danger? Network Security, 2002(2):10–11, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802002155.
Kinsella:2002:SBW
[1880] Richard Kinsella. Securing e-businessin a wireless environment. NetworkSecurity, 2002(2):12–13, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
[1901] Anonymous. Microsoft: the latestround of vulnerabilities. Network Secu-rity, 2002(4):1, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004014.
Anonymous:2002:TCD
[1902] Anonymous. ‘Trustworthy comput-ing’ — delivers a new vulnerabilityscanner to trust! Network Security,2002(4):2, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004026.
Anonymous:2002:RDN
[1903] Anonymous. Remote dial-up numbersfree for all to see. Network Security,2002(4):2, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004038.
Anonymous:2002:NWS
[1904] Anonymous. New Web services spec-ifications from Microsoft, IBM andVeriSign. Network Security, 2002(4):2–3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580200404X.
Anonymous:2002:SEU
[1905] Anonymous. Security embarrassmentfor UK business. Network Security,2002(4):3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004051.
Anonymous:2002:NFI
[1906] Anonymous. New fingerprint iden-tification technology for wireless de-vices. Network Security, 2002(4):3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004063.
Anonymous:2002:HCV
[1907] Anonymous. HP CEO voicemailleaked to press. Network Security,2002(4):3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004075.
Duke:2002:IE
[1908] David Duke. Image is every-thing! Network Security, 2002(4):4–5, April 1, 2002. CODEN
[1911] Bruce Laurie. Managed Vulnerabil-ity Assessment (MVA) — improvesecurity by understanding your ownvulnerabilities! Network Security,2002(4):8–9, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004117.
Hunter:2002:CPV
[1912] Philip Hunter. Canal Plus versusNDS case. Network Security, 2002(4):9–11, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004129.
Davis:2002:B
[1913] Dai Davis. Bluetooth. Network Se-curity, 2002(4):11–12, April 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802004130.
Cohen:2002:MWN
[1914] Fred Cohen. Misimpressions we needto extinguish. Network Security, 2002(4):12–17, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802004142.
Boni:2002:DSC
[1915] Bill Boni. The dark side of e-commerce— cracking the code or passing theBuck? Network Security, 2002(4):18–19, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1917] Anonymous. US Army opts forvulnerability assessment softwareto defend its global network ter-rain. Network Security, 2002(4):20, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),
[1919] Anonymous. Klez is back. Net-work Security, 2002(5):2, May 31,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580205002X.
Anonymous:2002:UFH
[1920] Anonymous. US FAA — hack-ers demonstrate what could hap-pen . . . . Network Security, 2002(5):2–3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802050031.
Anonymous:2002:URG
[1921] Anonymous. US retail giant closeswireless registers as data beams athackers. Network Security, 2002(5):3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802050043.
Anonymous:2002:LTA
[1922] Anonymous. Linux is target for at-tacks in Germany. Network Security,2002(5):3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1924] Anonymous. New network IDS solu-tions from Cisco. Network Security,2002(5):3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802050079.
Duke:2002:WDB
[1925] David Duke. What is the dif-ference between Denial-of-Service(DoS) and Distributed-Denial-of-Service (DDoS)? Network Security,2002(5):4, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802050080.
Anonymous:2002:WSW
[1926] Anonymous. Wireless security — whatis out there? Network Security,2002(5):5–6, May 31, 2002. CODEN
[1934] Anonymous. Instant Messaging — se-rious and secure? Network Security,2002(5):20, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802050171.
Anonymous:2002:LS
[1935] Anonymous. Linux — to be ornot to be secure. Network Security,2002(6):1–2, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1937] Anonymous. Cisco switches be-come even more intelligent. Net-work Security, 2002(6):2–3, June 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802060038.
Anonymous:2002:RPD
[1938] Anonymous. Rogue protocol detec-tion now possible. Network Security,2002(6):3, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580206004X.
Anonymous:2002:NVC
[1939] Anonymous. New virus can tar-get more than one operating sys-tem. Network Security, 2002(6):3, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802060051.
Anonymous:2002:MNV
[1940] Anonymous. More new virus tac-tics — JPEGS. Network Security,2002(6):3, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802060063.
Duke:2002:HW
[1941] David Duke. Hybrid worms. Net-work Security, 2002(6):4, June 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802060075.
Webb:2002:SWPb
[1942] Alison Webb. Security and Win-dows 2000: Part 2. Network Security,2002(6):5–8, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802060087.
Watson:2002:HSY
[1943] David Watson. How to secure yourwireless network. Network Security,2002(6):8–11, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802060099.
Davies:2002:WNR
[1944] Kerry Davies. What next? —A response to security for businessleaders. Network Security, 2002(6):12–13, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802060105.
Hone:2002:WME
[1945] Karin Hone and J. H. P. Eloff. Whatmakes an effective information secu-
[1949] Anonymous. Hackers demonstratea new show of strength. Net-work Security, 2002(7):1–2, July 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802070010.
Anonymous:2002:CCW
[1950] Anonymous. Changing the computer,as we know it. Network Security,2002(7):2, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802070022.
Anonymous:2002:MSH
[1951] Anonymous. Major satellite hackedin China. Network Security, 2002(7):2–3, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1954] David Duke. Peer-to-peer sharing.Network Security, 2002(7):4, July 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580207006X.
REFERENCES 260
Midian:2002:GMI
[1955] Paul Midian. Getting the mostout of Intrusion Detection Sys-tems. Network Security, 2002(7):5–7, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802070071.
Asenjo:2002:AES
[1956] Juan C. Asenjo. The Advanced En-cryption Standard — implementa-tion and transition to a new crypto-graphic benchmark. Network Security,2002(7):7–9, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802070083.
Abimbola:2002:SHP
[1957] Abiola Abimbola, David Gresty, andQi Shi. SubSeven’s honey pot pro-gram. Network Security, 2002(7):10–14, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1959] Fred Cohen. Is open source moreor less secure? Network Security,2002(7):17–19, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802070113.
Anonymous:2002:ECN
[1960] Anonymous. Event: CSI NetSec,2002, San Francisco. Network Secu-rity, 2002(7):19, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1962] Anonymous. US Government releasesecurity benchmarks. Network Secu-rity, 2002(7):20, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802070149.
Anonymous:2002:LWH
[1963] Anonymous. At last, a wirelesshoneypot. Network Security, 2002(8):1–2, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802080017.
REFERENCES 261
Anonymous:2002:SJD
[1964] Anonymous. Security job descrip-tions in disarray. Network Security,2002(8):2, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802080029.
Anonymous:2002:HCP
[1965] Anonymous. Hollywood crack downon piracy. Network Security, 2002(8):2–3, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802080030.
Anonymous:2002:UHS
[1966] Anonymous. US Homeland Secu-rity Bill. Network Security, 2002(8):3, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[1975] Anonymous. All quiet on the virusfront? Network Security, 2002(8):16–18, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802080133.
Anonymous:2002:YB
[1976] Anonymous. You’re in a Bind! Net-work Security, 2002(8):18–19, August1, 2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1982] Anonymous. Who has been hit by thebig bad DDoS? Network Security, 2002(9):3, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802090049.
REFERENCES 263
Anonymous:2002:EMI
[1983] Anonymous. EU to monitor Inter-net communications. Network Security,2002(9):3, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802090050.
Anonymous:2002:SAS
[1984] Anonymous. Spyware, adware, sys-temware and cookies. Network Se-curity, 2002(9):4–5, September 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802090062.
Anonymous:2002:PFQ
[1985] Anonymous. Promise from the fu-ture — quantum cryptography. Net-work Security, 2002(9):6, September 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[1987] Anonymous. Firewalls, intrusiondetection systems and vulnerabil-ity assessment: a superior conjunc-tion? Network Security, 2002(9):8–11, September 1, 2002. CODEN
[1993] Anonymous. The Whitehouse nationalstrategy to secure cyberspace. Net-work Security, 2002(10):2–3, October2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580210002X.
Anonymous:2002:NCT
[1994] Anonymous. New cybersecurity task-force from EC. Network Security,2002(10):3–4, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802100031.
Anonymous:2002:SLB
[1995] Anonymous. A slap for Linux, abug for Windows. Network Security,2002(10):4, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802100043.
Anonymous:2002:NOA
[1996] Anonymous. New organization to al-leviate vulnerability slip-ups. Net-work Security, 2002(10):4, October2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485802100055.
Anonymous:2002:ONV
[1997] Anonymous. Out with the oldand in with the new vulnera-bilities. Network Security, 2002(10):4, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802100067.
Anonymous:2002:SGS
[1998] Anonymous. SUN guru shineson Linux security and Web ser-vices. Network Security, 2002(10):5, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802100079.
Anonymous:2002:PW
[1999] Anonymous. The political worm. Net-work Security, 2002(10):5, October2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2013] David Duke. Downloader Tro-jans. Network Security, 2002(11):4–5, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802110063.
Hunter:2002:VLS
[2014] Philip Hunter. VOIP the latest secu-rity concern: DoS attack the great-est threat. Network Security, 2002(11):5–7, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2018] Fred Cohen. Breaking in to testsecurity? Network Security, 2002(11):17–19, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802110117.
Anonymous:2002:GSP
[2019] Anonymous. A gentle securityplayer? Network Security, 2002(11):19–20, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2026] Anonymous. In brief. Network Se-curity, 2002(12):3, December 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580212006X.
Duke:2002:PPT
[2027] David Duke. The peer-to-peerthreat. Network Security, 2002(12):4, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802120071.
Regan:2002:DSN
[2028] Kevin Regan. Designing a se-cure network for e-business and be-yond. Network Security, 2002(12):5–8, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802120083.
Anonymous:2002:GSA
[2029] Anonymous. Guidelines for secur-ing Apache Web servers. Network
[2030] Piers Wilson. IT security — state ofthe nation. Network Security, 2002(12):15–17, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802120101.
Cohen:2002:BM
[2031] Fred Cohen. Back up a minute. Net-work Security, 2002(12):17–19, De-cember 2002. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
[2033] Anonymous. Social engineering —gift of the gab. Network Security,2002(12):20, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485802120137.
Anonymous:2003:MSC
[2034] Anonymous. Microsoft security cul-ture shock. Network Security, 2003(1):1–3, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001016.
Anonymous:2003:SBZ
[2035] Anonymous. Security benchmarks zap91% of vulnerabilities. Network Secu-rity, 2003(1):3, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001028.
Anonymous:2003:TWA
[2036] Anonymous. Top 10 Web applica-tion holes exposed. Network Secu-rity, 2003(1):3, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580300103X.
Anonymous:2003:UGS
[2037] Anonymous. US Government slashessecurity strategy. Network Security,2003(1):3–4, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001041.
Anonymous:2003:Ba
[2038] Anonymous. In brief. Network Secu-rity, 2003(1):4, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001053.
REFERENCES 269
Anonymous:2003:MOC
[2039] Anonymous. Microsoft opens codeto governments. Network Security,2003(1):4, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001065.
Madsen:2003:NCC
[2040] Wayne Madsen. NIAC calls forchanges to US cybersecurity plan.Network Security, 2003(1):4, January2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803001077.
Duke:2003:P
[2041] David Duke. Passwords. Network Secu-rity, 2003(1):5, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001089.
Hunter:2003:LIU
[2042] Philip Hunter. Lack of integration un-dermines IT security. Network Security,2003(1):5–7, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001090.
Regan:2003:WLS
[2043] Kevin Regan. Wireless LAN secu-rity: Things you should know aboutWLAN security. Network Security,2003(1):7–9, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803001107.
Lord:2003:TTW
[2044] Steve Lord. Trouble at the Telco:When GSM goes bad. Network Se-curity, 2003(1):10–12, January 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803001119.
King:2003:MTB
[2045] David L. King. Moving towardsa business continuity culture. Net-work Security, 2003(1):12–17, January2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803001120.
Cohen:2003:SPA
[2046] Fred Cohen. Security programmers —not all the same. Network Security,2003(1):18–19, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2051] Anonymous. European honeypotserver — hacked sticky. NetworkSecurity, 2003(2):2, February 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803002034.
Anonymous:2003:CAP
[2052] Anonymous. CERT accused of profit-ing from research. Network Security,2003(2):3, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803002046.
Anonymous:2003:HGC
[2053] Anonymous. Hacker group —cracked. Network Security, 2003(2):3, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803002058.
Madsen:2003:NUI
[2054] Wayne Madsen. New US Internetmonitoring centre. Network Security,2003(2):3, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580300206X.
Anonymous:2003:Bb
[2055] Anonymous. In brief. NetworkSecurity, 2003(2):3, February 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803002071.
Duke:2003:FAV
[2056] David Duke. Fooling anti-virussystems. Network Security, 2003(2):4, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2058] Paul Midian. Perspectives on pen-etration testing — finding the rightsupplier. Network Security, 2003(2):9–11, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803002101.
Venter:2003:AVS
[2059] H. S. Venter and J. H. P. Eloff.Assessment of vulnerability scan-ners. Network Security, 2003(2):11–16, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803002113.
Forte:2003:SRN
[2060] Dario Forte. Slammer — the re-turn of the network nightmare. Net-work Security, 2003(2):17–18, February2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803002125.
Cohen:2003:SYI
[2061] Fred Cohen. Switching your infras-tructure. Network Security, 2003(2):19–20, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2070] Anonymous. Internet freedom pen-dulum turns again . . . and do peo-ple really care? Network Security,2003(3):8–9, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580300309X.
Anonymous:2003:MSS
[2071] Anonymous. The MS-SQL Slam-mer Worm. Network Security, 2003(3):10–14, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803003106.
Anonymous:2003:NAW
[2072] Anonymous. Network armies in a worldwithout secrets. Network Security,
2003(3):14–15, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803003118.
Anonymous:2003:DID
[2073] Anonymous. Distributed intrusion de-tection systems (DIDS) can make secu-rity more adaptive. Network Security,2003(3):16–18, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2078] Anonymous. Enterprise security con-cerns in year ahead. Network Secu-rity, 2003(4):2, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803004021.
Anonymous:2003:HAW
[2079] Anonymous. Hacktivists attack web-sites in war protests. Network Secu-rity, 2003(4):2, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803004033.
Anonymous:2003:Bd
[2080] Anonymous. In brief. Network Secu-rity, 2003(4):2–3, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803004057.
Anonymous:2003:TVC
[2081] Anonymous. Top 10 vulnerabilitesfrom CERT. Network Security,2003(4):3, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803004045.
Anonymous:2003:YCS
[2082] Anonymous. Is your current secu-rity SECURE?: John Jessop, Cryp-tic Software. Network Security,2003(4):3, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2084] Anonymous. Early alerts — makingsense of security information overload:Kevin Hawkins, Senior Principal Con-sultant, Symantec Corp. Network Secu-rity, 2003(4):5–7, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803004082.
Anonymous:2003:NSA
[2085] Anonymous. Network security in ac-tion — can a worm teach us any-thing?: Paul King, security con-sultant, Cisco Systems UK andIreland. Network Security, 2003(4):8–11, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803004094.
REFERENCES 274
Anonymous:2003:PPT
[2086] Anonymous. Perspectives on pene-tration testing — everybody knowsthis, surely?: Paul midian, insightconsulting. Network Security, 2003(4):12–14, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2093] Anonymous. IDS switches from de-tection to prevention. Network Secu-rity, 2003(5):2, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803005038.
Anonymous:2003:Be
[2094] Anonymous. In brief. Network Secu-rity, 2003(5):2–3, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803005026.
Anonymous:2003:WSS
[2095] Anonymous. Windows Server 2003secure? Network Security, 2003(5):3, May 2003. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371
REFERENCES 275
(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485803005051.
Anonymous:2003:NGM
[2096] Anonymous. New group merge phys-ical and cyber security. Network Se-curity, 2003(5):3, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803005063.
Anonymous:2003:CVM
[2097] Anonymous. Corporates are vulner-able to minor flaws. Network Secu-rity, 2003(5):3–4, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580300504X.
Potter:2003:BSO
[2098] Bruce Potter. Bluetooth — se-curity optional. Network Security,2003(5):4–5, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803005075.
Regan:2003:SVD
[2099] Kevin Regan. Secure VPN designconsiderations. Network Security,2003(5):5–10, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803005087.
Anonymous:2003:ILS
[2100] Anonymous. An inside look atSecurity Operation Centres: Dario
Forte outlines the role of Secu-rity Operation Centres, the gather-ers of intelligence, in the future ofsecurity. Network Security, 2003(5):11–12, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803005099.
Hunter:2003:DDS
[2101] Philip Hunter. Distributed De-nial of Service (DDOS) mitiga-tion tools. Network Security, 2003(5):12–14, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803005105.
Wilson:2003:WSS
[2102] Piers Wilson. Web services se-curity. Network Security, 2003(5):14–16, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2112] Anonymous. University launchesvirus writers course. Network Secu-rity, 2003(6):3, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803006068.
Potter:2003:WAO
[2113] Bruce Potter. Wireless authenti-cation options for up and downthe Stack. Network Security, 2003(6):4–5, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580300607X.
REFERENCES 277
Kristensen:2003:RIV
[2114] Thomas Kristensen. Rash of IEvulnerabilities. Network Security,2003(6):6, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803006081.
Mockapetris:2003:DYD
[2115] Paul V. Mockapetris. Defend-ing your DNS & DHCP — bestpractices. Network Security, 2003(6):7–10, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803006093.
Morrison:2003:DS
[2116] Paul Morrison. Database se-curity. Network Security, 2003(6):11–12, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580300610X.
Ollmann:2003:BPM
[2117] Gunter Ollmann. Best practice inmanaging HTTP-based client ses-sions. Network Security, 2003(6):13–17, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803006111.
Hunter:2003:DDP
[2118] Philip Hunter. Defence in depth — pro-tecting the queen. Network Security,2003(6):17–18, June 2003. CODEN
[2129] Anonymous. The perils of securitypatch management. Network Secu-rity, 2003(7):9–12, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803007098.
Anonymous:2003:PDH
[2130] Anonymous. Part 1: Deploying hon-eypots: Project background and im-plications. Network Security, 2003(7):13–14, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803007104.
Anonymous:2003:PIH
[2131] Anonymous. Part II: Honeypots in de-tail: the variations. Network Security,2003(7):14–15, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2139] Bruce Potter. Wireless device dis-covery. Network Security, 2003(8):4–5, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803008055.
Hunter:2003:SIO
[2140] Philip Hunter. Security issues withoffshore outsourcing: Offshore codingbooming, but is it safe? Answer isa qualified yes, but only if you doyour homework. Network Security,2003(8):5–6, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803008067.
Schultz:2003:SWV
[2141] E. Eugene Schultz. The SobigWorm variants: Letter after letterfrom A–E. Network Security, 2003(8):7–10, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803008079.
Chuvakin:2003:HHV
[2142] Anton Chuvakin. “Honeynets: Highvalue security data”: Analysis of
REFERENCES 280
real attacks launched at a hon-eypot. Network Security, 2003(8):11–15, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2144] Thomas Kristenson. A big pictureon recent vulnerabilities: Active AX,Web server compromises and inse-cure documents. Network Security,2003(8):19, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2149] Anonymous. Sobig family set to getbigger and badder. Network Security,2003(9):1–2, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803009012.
Anonymous:2003:Bi
[2150] Anonymous. In brief. Network Se-curity, 2003(9):2–3, September 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803009036.
Potter:2003:NGW
[2151] Bruce Potter. Next generation wire-less security tools. Network Security,2003(9):4–5, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803009048.
REFERENCES 281
Anonymous:2003:BCJ
[2152] Anonymous. Black Hat Conference:Not just hackers: Report from theInformation Security Festival. Confer-ence reporter. Network Security, 2003(9):5–6, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580300905X.
Anonymous:2003:UCD
[2153] Anonymous. Unravelling crypto de-velopments: Dr Nicko van Someren,founder and CTO of nCipher, sortsout fact from fiction when it comes toquantum encryption. Network Security,2003(9):7–8, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803009061.
King:2003:TSW
[2154] Stuart King. Threats and solutionsto Web services security. NetworkSecurity, 2003(9):8–11, September2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2158] Thomas Kristensen. The big pictureon big flaws: RPC DCOM vulnerabil-ity — what went wrong? NetworkSecurity, 2003(9):19–20, September2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2160] Anonymous. Microsoft bites back asblame deepens. Network Security, 2003(10):1, 3, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580301002X.
REFERENCES 282
Anonymous:2003:WIA
[2161] Anonymous. Why it all went wrongwith Blaster. Network Security, 2003(10):1–2, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803010018.
Anonymous:2003:VAF
[2162] Anonymous. Virus authors fasterto the kill. Network Security, 2003(10):2, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803010043.
Anonymous:2003:Bj
[2163] Anonymous. In brief. Network Se-curity, 2003(10):2–3, October 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803010031.
Schultz:2003:MWG
[2164] E. Eugene Schultz. The MS-Blaster worm: going from bad toworse. Network Security, 2003(10):4–8, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803010055.
Anonymous:2003:SWA
[2165] Anonymous. Summer of worms: Au-gust’s child is a virus writer. Net-work Security, 2003(10):8–10, October2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485803010067.
Potter:2003:WSP
[2166] Bruce Potter. Wireless securitypolicies. Network Security, 2003(10):10–12, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803010079.
Stewart:2003:SSA
[2167] Joe Stewart. Spam & Sobig: armin arm. Network Security, 2003(10):12–16, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803010080.
Sullivan:2003:VAW
[2168] Paul Sullivan. Vulnerability analy-sis — what is important and whatis not. Network Security, 2003(10):17–19, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803010092.
Kristensen:2003:BPBb
[2169] Thomas Kristensen. The big pic-ture on big holes: SSH and Send-mail challenge Microsoft’s top spotfor flaws. Network Security, 2003(10):19–20, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2171] Anonymous. Virus tracking movesback to basics. Network Security, 2003(11):1, 3, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803011024.
Madsen:2003:CST
[2172] Wayne Madsen. Computerizedsurveillance a top priority for Pen-tagon. Network Security, 2003(11):1–2, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803011012.
Anonymous:2003:Bk
[2173] Anonymous. In brief. Network Se-curity, 2003(11):2–3, November 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485803011036.
Anonymous:2003:EDR
[2174] Anonymous. Expert debunks regula-tion in cybersecurity. Network Security,2003(11):2–3, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803011048.
Potter:2003:WBL
[2175] Bruce Potter. Wireless-based loca-tion tracking. Network Security, 2003(11):4–5, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580301105X.
Lobo:2003:SLM
[2176] Colin Lobo. Security log man-agement. Network Security, 2003(11):6–9, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803011061.
Ranum:2003:DS
[2177] Marcus J. Ranum. The death ofspam? Network Security, 2003(11):10–13, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2179] Thomas Kristenson. The big pictureon big holes. Network Security, 2003(11):15–17, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803011097.
REFERENCES 284
Dwan:2003:BMP
[2180] Berni Dwan. Body mnemonics inPDA security. Network Security, 2003(11):17, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485803011103.
Ollmann:2003:IPS
[2181] Gunter Ollmann. Intrusion preven-tion systems (IPS) destined to replacelegacy routers. Network Security, 2003(11):18–19, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2196] Thomas Kristenson. The big pictureon Blg holes. Network Security, 2003(12):19–20, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2198] Catherine Everett. Social engineeringemails get more devious. Network Secu-rity, 2004(1):1, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 286
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000157.
Madsen:2004:PDS
[2199] Wayne Madsen. Passenger data shar-ing continues to be a problem be-tween US & EU. Network Security,2004(1):2, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000170.
Anonymous:2004:Ba
[2200] Anonymous. In brief. Network Se-curity, 2004(1):2–3, January 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2203] Anonymous. Check Point goes in-side to stop threat. Network Secu-rity, 2004(1):3, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000200.
Potter:2004:WBM
[2204] Bruce Potter. Warchalking and Blue-jacking: Myth or reality. Net-work Security, 2004(1):4–5, January2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000212.
Schultz:2004:WSP
[2205] E. Eugene Schultz. Windows2000 security: a postmortem anal-ysis. Network Security, 2004(1):6–9, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000224.
Ford:2004:GGW
[2206] Richard Ford and Helayne Ray.Googling for gold: Web crawlers,hacking and defense explained. Net-work Security, 2004(1):10–13, January2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000236.
Levenhagen:2004:TCV
[2207] Roger Levenhagen. Trends, codesand virus attacks — 2003 year inreview. Network Security, 2004
REFERENCES 287
(1):13–15, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2209] Philip hunter. IP V6: Security is-sues. Network Security, 2004(1):17–19, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000261.
Kristenson:2004:BPBa
[2210] Thomas Kristenson. The big pictureon big holes. Network Security, 2004(1):19–20, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2213] Anonymous. Microsoft source codeexploited. Network Security, 2004(2):1–2, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000303.
McKenna:2004:ICS
[2214] Brian McKenna. IBM and Ciscostep up security convergence. Net-work Security, 2004(2):2–3, February2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000315.
Anonymous:2004:Bb
[2215] Anonymous. In brief. Network Se-curity, 2004(2):2–3, February 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000327.
Potter:2004:SMD
[2216] Bruce Potter. Securing the mo-bile device. Network Security, 2004(2):4–5, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000339.
REFERENCES 288
Miller:2004:MWY
[2217] Andrew Miller. Is malware wreckingyour computer? Network Security,2004(2):5–6, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000340.
Furnell:2004:HUH
[2218] Steven Furnell and Stamatis Bolakis.Helping us to help ourselves: Assess-ing administrators’ use of security anal-ysis tools. Network Security, 2004(2):7–12, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000352.
Anonymous:2004:MDY
[2219] Anonymous. MyDoom: Do you “getit” yet? Network Security, 2004(2):13–15, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000364.
Kristensen:2004:BPBa
[2220] Thomas Kristensen. The big pic-ture on big holes. Network Security,2004(2):15, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2222] Philip Hunter. Combating videopiracy. Network Security, 2004(2):18–19, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400039X.
Anonymous:2004:ATW
[2223] Anonymous. Not another teenager— where are the grown-up virus au-thors? Network Security, 2004(2):20, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2238] Thomas Kristenson. The big pic-ture on big holes. Network Secu-rity, 2004(3):19, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000558.
Hichert:2004:OFS
[2239] Jan Hichert. Opinion: The finan-cial sector’s move to open source se-curity products. Network Security,2004(3):19–20, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400056X.
Anonymous:2004:ECc
[2240] Anonymous. Events calendar. Net-work Security, 2004(3):20, March
[2250] Dario Forte. The importance of textsearches in digital forensics. Net-work Security, 2004(4):13–15, April2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000674.
Morgan:2004:NSC
[2251] David Morgan. Network securityand custom Web applications. Net-work Security, 2004(4):15–17, April2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000686.
Wood:2004:RIS
[2252] Peter Wood. Real IT security ona limited budget? Network Secu-rity, 2004(4):18, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000698.
McKenna:2004:IRA
[2253] Brian McKenna. Interview — remoteaccess at the BBC. Network Security,2004(4):19–20, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2255] Anonymous. Microsoft bounty huntleads to German youths. Network Se-curity, 2004(5):1, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400073X.
Anonymous:2004:OBS
[2256] Anonymous. Online betting site beatsblackmail DDoS. Network Security,2004(5):1, 3, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000728.
Madsen:2004:HCS
[2257] Wayne Madsen. House considers secu-rity and privacy proposals. Network Se-curity, 2004(5):2, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000753.
Anonymous:2004:Be
[2258] Anonymous. In brief. Network Secu-rity, 2004(5):2–3, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000741.
Everett:2004:ESB
[2259] Cath Everett. Eurovision se-cures borders. Network Security,2004(5):3, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000765.
Potter:2004:GS
[2260] Bruce Potter. GSM security. Net-work Security, 2004(5):4–5, May 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2262] David Morgan. Securing high availabil-ity Web applications. Network Secu-rity, 2004(5):8–11, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000790.
Dwan:2004:OSV
[2263] Berni Dwan. Open source vsclosed. Network Security, 2004(5):11–13, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000807.
REFERENCES 293
Furnell:2004:GCP
[2264] Steven M. Furnell. Getting caught inthe phishing net. Network Security,2004(5):14–18, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000819.
Balle:2004:BPB
[2265] Jakob Balle. The big picture onbig holes. Network Security, 2004(5):18–20, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2267] Anonymous. HP exploits new bugsto fix its systems. Network Secu-rity, 2004(6):1, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000856.
Anonymous:2004:UGA
[2268] Anonymous. US Government agen-cies struggle at patch manage-ment. Network Security, 2004(6):1–2, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000844.
Anonymous:2004:Bf
[2269] Anonymous. In brief. Network Secu-rity, 2004(6):2–3, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000868.
McKenna:2004:BFA
[2270] Brian McKenna. Bug-fixed applica-tions still insecure. Network Secu-rity, 2004(6):2–3, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400087X.
McKenna:2004:CTM
[2271] Brian McKenna. Cisco and TrendMicro tighten collaboration aroundSasser-like attacks. Network Secu-rity, 2004(6):3, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000881.
Potter:2004:FWS
[2272] Bruce Potter. Fixing wireless se-curity. Network Security, 2004(6):4–5, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000893.
Schultz:2004:RWS
[2273] E. Eugene Schultz. RPC in Win-dows systems: what you don’t know
REFERENCES 294
could hurt you. Network Security,2004(6):5–8, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400090X.
Paget:2004:HCA
[2274] Chris Paget. Hack chaining: Attacksthat become possible when a serveris compromised. Network Security,2004(6):8–11, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000911.
Furnell:2004:WVR
[2275] Steven Furnell. When vulnerabilityreports can work against us. Net-work Security, 2004(6):11–15, June2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000923.
Hunter:2004:ISN
[2276] Philip Hunter. Integrated secu-rity and network management re-main elusive. Network Security,2004(6):15–16, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000935.
Gordon:2004:SCA
[2277] Sarah Gordon. A short course in an-tivirus software testing: seven sim-ple rules for evaluating tests. Net-work Security, 2004(6):17–18, June2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485804000947.
Balle:2004:BAF
[2278] Jakob Balle. Bruised Apple tofight back? Network Security,2004(6):19–20, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2280] Brian McKenna. UK MPs callfor Computer Misuse Act upgrade:CMA in dire need of reform, saysreport. Network Security, 2004(7):1, 3, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804000984.
Everett:2004:TTB
[2281] Cath Everett. Testing times forbeleagured Internet Explorer. Net-work Security, 2004(7):1–2, July 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804000972.
Anonymous:2004:Bg
[2282] Anonymous. In brief. Network Secu-rity, 2004(7):2–3, July 2004. CODEN
[2283] Anonymous. Microsoft unleash7 updates. Network Security,2004(7):3, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400100X.
Potter:2004:SGT
[2284] Bruce Potter. 802.16 security: get-ting there? Network Security,2004(7):4–5, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001011.
Dunn:2004:AUR
[2285] Kevin Dunn. Automatic updaterisks: can patching let a hacker in?Network Security, 2004(7):5–8, July2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001023.
Miller:2004:PSC
[2286] Andrew Miller. PDA security con-cerns. Network Security, 2004(7):8–10, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001035.
Gorling:2004:PWY
[2287] Stefan Gorling. Parasites: whatyou can’t see can hurt you. Net-work Security, 2004(7):11–13, July2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001047.
Dwan:2004:MPV
[2288] Berni Dwan. The mobile phonevirus. Network Security, 2004(7):14–15, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001059.
Papadaki:2004:IIW
[2289] Maria Papadaki and Steven Furnell.IDS or IPS: what is best? Net-work Security, 2004(7):15–19, July2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001060.
Kristensen:2004:BPBb
[2290] Thomas Kristensen. The big pic-ture on big holes. Network Security,2004(7):19–20, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2299] Philip Hunter. Linux security: sep-arating myth from reality. Net-work Security, 2004(8):8–9, August2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001163.
Chuvakin:2004:LID
[2300] Anton Chuvakin. Linux intrusion dis-covery: when security fails. Net-work Security, 2004(8):10–12, August2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001175.
Hilley:2004:TCP
[2301] Sarah Hilley. Trusted computing —path to security or road to servi-tude? Network Security, 2004(8):12–15, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 297
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001187.
Lobo:2004:WMD
[2302] Colin Lobo. Where’s my datagone!? Network Security, 2004(8):15–17, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001199.
Anonymous:2004:GGW
[2303] Anonymous. Google’s Gmail — willads, privacy concerns or security fearsspoil the free lunch? Network Security,2004(8):18–19, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001205.
Sandblad:2004:BPB
[2304] Andreas Sandblad. The big pictureon big holes. Network Security, 2004(8):19–20, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2310] Anonymous. In brief. Network Se-curity, 2004(9):2–3, September 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001254.
REFERENCES 298
Anonymous:2004:VM
[2311] Anonymous. VPN for the masses. Net-work Security, 2004(9):3, September2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580400128X.
Potter:2004:SE
[2312] Bruce Potter. Security to theedge. Network Security, 2004(9):4–5, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001291.
Wilson:2004:TSY
[2313] Piers Wilson. Tips to stop your usersfrom being phished. Network Security,2004(9):5–9, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001308.
Kemp:2004:GM
[2314] Michael Kemp. Ghosts in the ma-chine. Network Security, 2004(9):9–12, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400131X.
David:2004:NTB
[2315] Jon David. New threats bring newtreatments. Network Security, 2004(9):12–15, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001321.
Dwan:2004:HAS
[2316] Berni Dwan. Honeynets aim to stingblackhats. Network Security, 2004(9):15–18, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001333.
Eiram:2004:BPB
[2317] Carsten Eiram. The big picture onbig holes. Network Security, 2004(9):18–20, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2319] Anonymous. Top 20 fear list un-leashed. Network Security, 2004(10):1–2, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2321] Brian McKenna. Accelerated IP v6shift caught at Check Point. Net-work Security, 2004(10):3, October2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001382.
McKenna:2004:CTO
[2322] Brian McKenna. Combination tools tooust point products. Network Security,2004(10):3, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001394.
Anonymous:2004:Bj
[2323] Anonymous. In brief. NetworkSecurity, 2004(10):3, October 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001400.
Potter:2004:SNS
[2324] Bruce Potter. Software & networksecurity. Network Security, 2004(10):4–5, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001412.
Anonymous:2004:UNS
[2325] Anonymous. US NSF to spend $30mto defeat malware. Network Security,2004(10):5–6, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001424.
Schultz:2004:USD
[2326] Gene Schultz. Using ssh: Dosecurity risks outweigh the bene-fits? Network Security, 2004(10):7–10, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001436.
Furnell:2004:MCA
[2327] Steven Furnell and Jeremy Ward.Malware comes of age: The ar-rival of the true computer para-site. Network Security, 2004(10):11–15, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001448.
Kemp:2004:BIR
[2328] Michael Kemp. Basic incidentresponse for system administra-tors. Network Security, 2004(10):16–18, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400145X.
Kristensen:2004:LP
[2329] Thomas Kristensen. Lethal pic-tures. Network Security, 2004(10):19–20, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001461.
McKenna:2004:LAV
[2330] Brian McKenna. Lumeta adds visu-als to network discovery tool. Net-
[2333] Brian McKenna. American Ex-press deploys appliance for securefile transfer. Network Security, 2004(11):2, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001503.
Anonymous:2004:Bk
[2334] Anonymous. In brief. Network Se-curity, 2004(11):3, November 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001527.
Anonymous:2004:ISL
[2335] Anonymous. IBM’s support for theLiberty Alliance brings standard con-vergence for federated identity a stepcloser. Network Security, 2004(11):3, 20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001515.
Potter:2004:VIA
[2336] Bruce Potter. The value of Inter-net alerts. Network Security, 2004(11):4, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001539.
Young:2004:HRV
[2337] Dale Young. Human resourceshave a vital role to play withinemployee identity and access man-agement. Network Security, 2004(11):5–7, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001540.
Morgan:2004:DIH
[2338] David Morgan. Does IT hang to-gether? Network Security, 2004(11):8–10, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001552.
Vidalis:2004:ACT
[2339] Stilianos Vidalis, Andy Jones, andAndrew Blyth. Assessing cyber-
REFERENCES 301
threats in the information environ-ment. Network Security, 2004(11):10–16, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001564.
Kristensen:2004:MLW
[2340] Thomas Kristensen. Microsoftleaves Win2000, XPSP1 users inlurch. Network Security, 2004(11):16–17, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001576.
Shechtman:2004:DC
[2341] Katrin Shechtman. Divide and con-quer. Network Security, 2004(11):18–19, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001588.
Anonymous:2004:USA
[2342] Anonymous. USB sticks to be au-dited — no escape. Network Security,2004(11):20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580400159X.
Anonymous:2004:GRD
[2343] Anonymous. Government regulationsdrive job demand. Network Security,2004(11):20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001606.
Anonymous:2004:MSCb
[2344] Anonymous. MS source code fencebusted. Network Security, 2004(11):20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2349] Anonymous. In brief. Network Se-curity, 2004(12):3–4, December 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001667.
Anonymous:2004:YR
[2350] Anonymous. Year in review. Net-work Security, 2004(12):4, December2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485804001679.
Potter:2004:BBW
[2351] Bruce Potter. Big Boss is watching you— but should he? Network Security,2004(12):5–6, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001680.
Fumy:2004:ISS
[2352] Walter Fumy. IT security stan-dardisation. Network Security, 2004(12):6–11, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485804001692.
Morgan:2004:DE
[2353] David Morgan. Deploying ex-tranets? Network Security, 2004(12):12–14, December 2004. CODEN
[2359] Nova Dudley-Gough. Wave of de-ceit crashes on the charitable. Net-work Security, 2005(1):1, January2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805001765.
McKenna:2005:RSO
[2360] Brian McKenna. Reuters steps up out-sourced monitoring. Network Secu-rity, 2005(1):2, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001777.
McKenna:2005:SBV
[2361] Brian McKenna. Symantec buysVeritas to broaden enterprise ap-peal. Network Security, 2005(1):2–3, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001789.
Anonymous:2005:Ba
[2362] Anonymous. In brief. Network Secu-rity, 2005(1):3, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001790.
Hunter:2005:TSG
[2363] Philip Hunter. Tsunami spares globalIT but shakes up disaster recov-ery plans. Network Security, 2005(1):4–5, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001807.
Schultz:2005:IES
[2364] E. Eugene Schultz. Internet Explorersecurity: is there any hope? Net-work Security, 2005(1):6–10, January2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805001819.
Ionescu:2005:ESD
[2365] Ionut Ionescu. Embedded security andthe drivers behind it. Network Security,2005(1):10–13, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001820.
Morgan:2005:LLN
[2366] David Morgan. Low-level network as-sessment: firewalls. Network Security,2005(1):14–16, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001832.
Potter:2005:BBW
[2367] Bruce Potter. Is big boss watch-ing you? Network Security, 2005(1):17–18, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 304
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001844.
Kristensen:2005:MHT
[2368] Thomas Kristensen. More holes than aphishing net. Network Security, 2005(1):18–19, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2370] Brian McKenna. Bullish BritishSMEs poised to splash on IT se-curity. Network Security, 2005(1):20, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580500187X.
Dudley-Gough:2005:JBF
[2371] Nova Dudley-Gough. Jail for bug find-ing researcher? Network Security,2005(1):20, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001881.
Anonymous:2005:ECa
[2372] Anonymous. Events calendar. Net-work Security, 2005(1):20, January
[2373] Brian McKenna. Symantec’s Thomp-son pronounces old style IT secu-rity dead. Network Security, 2005(2):1, 3, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001947.
Anonymous:2005:MPF
[2374] Anonymous. Microsoft pushes fur-ther into anti-virus and anti-spywareterritory. Network Security, 2005(2):1–2, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580500190X.
Mathieson:2005:PDG
[2375] SA Mathieson. Profession drive gath-ers momentum. Network Security,2005(2):2, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001911.
Hilley:2005:CWS
[2376] Sarah Hilley. Cisco widens securityspan in network. Network Security,2005(2):2–3, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001923.
REFERENCES 305
McKenna:2005:GAS
[2377] Brian McKenna. Gates announcessecurity invasion. Network Security,2005(2):3, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001935.
Anonymous:2005:Bb
[2378] Anonymous. In brief. NetworkSecurity, 2005(2):3, February 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805001959.
Edelson:2005:VIS
[2379] Eve Edelson. Voice over IP: secu-rity pitfalls. Network Security, 2005(2):4–7, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001960.
Stanton:2005:GAS
[2380] Ray Stanton. Getting ahead insecurity. Network Security, 2005(2):8–10, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001972.
Kemp:2005:WIB
[2381] Mike Kemp. When ignorance isnot bliss. Network Security, 2005(2):10–12, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001984.
Knight:2005:WCH
[2382] William Knight. Worm cure is ahard act. Network Security, 2005(2):12–14, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805001996.
Potter:2005:BAS
[2383] Bruce Potter. Bluetooth attacks startto bite. Network Security, 2005(2):14–15, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580500200X.
Hunter:2005:MTV
[2384] Philip Hunter. Microsoft tack-les viruses and spyware at last,but will it be trusted on secu-rity? Network Security, 2005(2):16–17, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805002011.
Pollard:2005:TFC
[2385] Craig Pollard. Telecom fraud: thecost of doing nothing just wentup. Network Security, 2005(2):17–19, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805002023.
Kristensen:2005:IPA
[2386] Thomas Kristensen. IE patched af-ter ‘extremely critical’ warning. Net-work Security, 2005(2):19–20, February
[2392] Brian McKenna. Close shave forJapanese bank. Network Security,2005(3):4, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805002096.
Potter:2005:DUU
[2393] Bruce Potter. Dangerous urls: Uni-code & IDN. Network Security,2005(3):5–6, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805002102.
Kemp:2005:BSC
[2394] Mike Kemp. Building security cred-ibility. Network Security, 2005(3):6–8, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805002114.
Furnell:2005:AOW
[2395] Steven Furnell. Authenticating our-selves: will we ever escape the pass-word? Network Security, 2005(3):8–13, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805002126.
REFERENCES 307
Heywood:2005:KYD
[2396] Mark Heywood. Keeping your dataavailable in 10 steps. Network Security,2005(3):14–16, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805002138.
Gosling:2005:TSE
[2397] Paul Gosling. Trojans & spyware: anelectronic Achilles. Network Security,2005(3):17–18, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580500214X.
Mathieson:2005:MPT
[2398] SA Mathieson. Mobile phone trackingthreatens privacy. Network Security,2005(3):19–20, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2401] Brian McKenna. Qualys ticks com-pliance box. Network Security,2005(4):2, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580570218X.
McKenna:2005:RHW
[2402] Brian McKenna. Russian hackersare world class. Network Secu-rity, 2005(4):3, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702191.
Anonymous:2005:Bd
[2403] Anonymous. In brief. Network Secu-rity, 2005(4):3, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702208.
Stanton:2005:ISP
[2404] Ray Stanton. Inside out security:de-perimeterisation. Network Secu-rity, 2005(4):4–6, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580570221X.
Stewart:2005:CAN
[2405] Andrew Stewart. A contempo-rary approach to network vulnera-bility assessment. Network Security,2005(4):7–10, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 308
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702221.
Hilley:2005:CRM
[2406] Sarah Hilley. Crypto race for math-ematical infinity. Network Security,2005(4):10–11, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702233.
Kemp:2005:BES
[2407] Mike Kemp. Biometrics: the eyeof the storm. Network Security,2005(4):11–13, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702245.
Hunter:2005:PSL
[2408] Philip Hunter. Proactive security lat-est: vendors wire the cage but has thebudgie flown . . . . Network Security,2005(4):14–15, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702257.
Dean:2005:MAS
[2409] Roger Dean. Management aspectsof secure messaging between orga-nizations. Network Security, 2005(4):16–17, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702269.
Potter:2005:RMU
[2410] Bruce Potter. RFID: misunderstoodor untrustworthy? Network Security,2005(4):17–18, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702270.
Grimes:2005:NSM
[2411] Galen A. Grimes. Network secu-rity managers’ preferences for theSnort IDS and GUI add-ons. Net-work Security, 2005(4):19–20, April2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805702282.
Anonymous:2005:VFY
[2412] Anonymous. Vulnerabilities so farthis year — A-V, Oracle, media play-ers and Microsoft. Network Secu-rity, 2005(5):1–2, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2415] Anonymous. In brief. Network Secu-rity, 2005(5):3, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702324.
Licari:2005:BPI
[2416] Joe Licari. Best practices for instantmessaging in business. Network Secu-rity, 2005(5):4–7, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702336.
Ernest-Jones:2005:UNS
[2417] Terry Ernest-Jones. US National Sci-ence Foundation: $19m security re-search programme. Network Secu-rity, 2005(5):8–9, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702348.
Beal:2005:ISP
[2418] Barry Beal. IT security: the prod-uct vendor landscape. Network Secu-rity, 2005(5):9–10, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580570235X.
Marteau:2005:MXS
[2419] Laurent Marteau. Mac OS X & secu-rity — an overview. Network Security,2005(5):11–13, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702361.
Potter:2005:ISN
[2420] Bruce Potter. IT security needshierarchy. Network Security, 2005(5):14–15, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702373.
Kemp:2005:WBT
[2421] Mike Kemp. For whom thebells toll: effective IDS deploy-ment strategies. Network Security,2005(5):16–18, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702385.
Sidaway:2005:RRB
[2422] Garry Sidaway. The rise and riseof bot networks. Network Security,2005(5):19–20, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2435] Anonymous. US state police leadersconfront CardSystems. Network Secu-rity, 2005(7):1, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580570252X.
McKenna:2005:CTA
[2436] Brian McKenna. Cyber-terroristassault will happen, says Conser-vative MP. Network Security,2005(7):2, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702531.
McKenna:2005:CCD
[2437] Brian McKenna. Credit card de-tails in the clear and up forsale in India. Network Security,2005(7):2, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702543.
McKenna:2005:BSS
[2438] Brian McKenna. Bank startsto sell PKI. Network Security,2005(7):3, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702555.
Anonymous:2005:Bg
[2439] Anonymous. In brief. Network Secu-rity, 2005(7):3, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702567.
Potter:2005:QCS
[2440] Bruce Potter. Quantum crypto: Startrek or real science? Network Secu-rity, 2005(7):4–5, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702579.
Furnell:2005:ITE
[2441] Steven Furnell. Internet threatsto end-users: Hunting easy prey.Network Security, 2005(7):5–9, July2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805702580.
Stuttard:2005:SO
[2442] Dafydd Stuttard. Security & ob-scurity. Network Security, 2005(7):10–12, July 2005. CODEN
[2443] Paul Rowe. VOIP — extra threatsin the converged environment. Net-work Security, 2005(7):12–16, July2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805702609.
OConor:2005:ISO
[2444] Mark O’Conor. The implications ofSarbanes–Oxley for non-US IT de-partments. Network Security, 2005(7):17–20, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2446] Brian McKenna. New Symantecto avoid “over integration”. Net-work Security, 2005(8):2, August2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805702634.
McKenna:2005:ECB
[2447] Brian McKenna. Enterasys CTOblasts Cisco and ISS over hole con-troversy. Network Security, 2005(8):2, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702646.
Anonymous:2005:BWB
[2448] Anonymous. Bidding war for bughunter rewards. Network Security,2005(8):3, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702658.
Anonymous:2005:Bh
[2449] Anonymous. In brief. NetworkSecurity, 2005(8):3–4, August 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580570266X.
Everett:2005:GN
[2450] Cath Everett. Godfathers of thenet. Network Security, 2005(8):4–20, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702671.
Ernest-Jones:2005:BCS
[2451] Terry Ernest-Jones. Business conti-nuity strategy — the life line. Net-work Security, 2005(8):5–9, August2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 313
URL http://www.sciencedirect.
com/science/article/pii/S1353485805702683.
Bertrand:2005:BCM
[2452] Christophe Bertrand. Business con-tinuity and mission critical appli-cations. Network Security, 2005(8):9–11, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702695.
McKenna:2005:DDL
[2453] Brian McKenna. Dig deep and looksideways. Network Security, 2005(8):12–13, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702701.
Kemp:2005:BTS
[2454] Mike Kemp and Michael Kemp. Be-yond trust: security policies anddefence-in-depth. Network Security,2005(8):14–16, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702713.
Potter:2005:SNC
[2455] Bruce Potter. Securing the network:changing priorities. Network Security,2005(8):16–17, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702725.
Bradbury:2005:BBF
[2456] Danny Bradbury. Bits and bridlesfor free speech. Network Security,2005(8):17–19, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2459] Joe O’Halloran. Zotob and VoIP. Net-work Security, 2005(9):2–20, Septem-ber 2005. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485805702762.
Anonymous:2005:URI
[2460] Anonymous. US researchers to in-vent new Internet. Network Security,2005(9):3, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702774.
REFERENCES 314
Anonymous:2005:Bi
[2461] Anonymous. In brief. Network Se-curity, 2005(9):3, September 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2463] Bruce Potter. Are passwordsdead? Network Security, 2005(9):7–8, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702804.
Morgan:2005:FPF
[2464] David Morgan. Fool-proofing fire-walls. Network Security, 2005(9):9–11, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702816.
Wood:2005:IIM
[2465] Peter Wood. Implementing identitymanagement security — an ethicalhacker’s view. Network Security, 2005(9):12–15, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702828.
Sullivan:2005:CFI
[2466] Roger K. Sullivan. The case for feder-ated identity. Network Security, 2005(9):15–19, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2471] Matthew Pemble. Evolutionarytrends in bank customer-targetedmalware. Network Security, 2005(10):4–7, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702889.
Dunn:2005:DYD
[2472] Kev Dunn. Dig yourself out ofthe data crater — database secu-rity isn’t new, so why can’t we getit right? Network Security, 2005(10):7–10, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702890.
Potter:2005:EZD
[2473] Bruce Potter. The end of zerodays? Network Security, 2005(10):10–11, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702907.
Hallam-Baker:2005:PSN
[2474] Phillip Hallam-Baker. Preventionstrategies for the next wave of cy-ber crime. Network Security, 2005(10):12–15, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805702919.
Whitworth:2005:OSB
[2475] Martin Whitworth. Outsourced secu-rity — the benefits and risks. NetworkSecurity, 2005(10):16–19, October2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805702920.
Anonymous:2005:QWC
[2476] Anonymous. QualysGuard to workwith Cisco NAC. Network Security,2005(10):20, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2481] SA Mathieson. DoS attack not illegal,says London judge. Network Security,2005(11):2–3, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2483] Mark Crosbie. Biometrics for enter-prise security. Network Security, 2005(11):4–8, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805703007.
Davis:2005:RSI
[2484] Adrian Davis. Return on secu-rity investment — proving it’s worthit. Network Security, 2005(11):8–10, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805703019.
Morgan:2005:ESP
[2485] David Morgan. The evolution of secu-rity purchasing. Network Security, 2005(11):11–12, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805703020.
Keanini:2005:PTI
[2486] Tim Keanini. Protecting TCP/IP. Network Security, 2005(11):13–16, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485805703032.
Viveros:2005:CMT
[2487] Sal Viveros. Changing malwarethreats — AV vendor’s view. NetworkSecurity, 2005(11):16–18, November2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485805703044.
Potter:2005:LSV
[2488] Bruce Potter. Layer 2 security: invogue. Network Security, 2005(11):18–20, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),
[2502] SA Mathieson. Apps under fire. Net-work Security, 2006(1):1–2, January2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485806703191.
Anonymous:2006:Ba
[2503] Anonymous. In brief. Network Secu-rity, 2006(1):3, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703208.
Furnell:2006:RPS
[2504] Steven Furnell and Leith Zekri. Re-placing passwords: in search of thesecret remedy. Network Security,2006(1):4–8, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2510] Joe O’Halloran. Skype — an attacksurface here to stay. Network Security,2006(1):20, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2512] Anonymous. Spyware spikes in north-ern Europe. Network Security, 2006(2):1–2, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703294.
Mathieson:2006:FTO
[2513] SA Mathieson. Fine-tuning forOlympic IT security. Network Security,2006(2):2, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703300.
McKenna:2006:GMC
[2514] Brian McKenna. Gates and Mc-Neally commit to sharing on Valen-tine’s Day. Network Security, 2006(2):2, 20, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703312.
Anonymous:2006:Bb
[2515] Anonymous. In brief. NetworkSecurity, 2006(2):3, February 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485806703324.
Potter:2006:NTA
[2516] Bruce Potter. New threat of Ap-ple Mac OS X. Network Security,2006(2):4–5, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703336.
Wood:2006:HTF
[2517] Peter Wood. The hacker’s top fiveroutes into the network (and how
REFERENCES 320
to block them). Network Security,2006(2):5–9, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2523] SA Mathieson. John Lewis monitorsmoves on CCTV. Network Security,2006(3):1–2, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703403.
Anonymous:2006:ICB
[2524] Anonymous. ISS’s CTO on 2006— botnet armies and security ser-vices online. Network Security, 2006(3):2, 20, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703415.
Anonymous:2006:Bc
[2525] Anonymous. In brief. Network Secu-rity, 2006(3):3, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703427.
Furnell:2006:UPW
[2526] Steven Furnell and Bogdan Ghita.Usability pitfalls in wireless LANsecurity. Network Security, 2006(3):4–8, March 2006. CODEN
[2527] David Morgan. Web injection at-tacks. Network Security, 2006(3):8–10, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703440.
Waite:2006:SOB
[2528] Steve Waite. Securing online busi-ness with SSL. Network Security,2006(3):10–12, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703452.
McGurk:2006:SDS
[2529] Ian McGurk. Stealing data on smalldevices — tools to wipe out the iPodpredator. Network Security, 2006(3):13–16, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703464.
Frost:2006:VTG
[2530] Nick Frost. VoIP threats — get-ting louder. Network Security, 2006(3):16–18, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703476.
Potter:2006:BSM
[2531] Bruce Potter. Bluetooth securitymoves. Network Security, 2006(3):19–20, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2533] Anonymous. UK business carelesswith online data. Network Security,2006(4):1–2, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703506.
Hilley:2006:HSO
[2534] Sarah Hilley. HSBC to secure onlinebusiness customers. Network Secu-rity, 2006(4):2, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703518.
Anonymous:2006:Bd
[2535] Anonymous. In brief. Network Secu-rity, 2006(4):3, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580670352X.
REFERENCES 322
Morgan:2006:WAS
[2536] David Morgan. Web applica-tion security — SQL injection at-tacks. Network Security, 2006(4):4–5, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703531.
Khokhar:2006:SCB
[2537] Rafael Khokhar. Smartphones —a call for better safety on themove. Network Security, 2006(4):6–7, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703543.
Rana:2006:SVOa
[2538] Omer Rana and Jeremy Hilton. Se-curing the virtual organization —Part 1: Requirements from gridcomputing. Network Security, 2006(4):7–10, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703555.
Whitworth:2006:VCB
[2539] Martin Whitworth. VoIP — a call forbetter protection. Network Security,2006(4):11–12, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703567.
delaCuadra:2006:ASB
[2540] Fernando de la Cuadra. The artof security budgeting — a new
[2541] Bruce Potter. User education —how valid is it? Network Security,2006(4):15–16, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703580.
Forte:2006:KSI
[2542] Dario Forte. Keeping up to stan-dard — incident management inISO 17799. Network Security, 2006(4):16–17, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703592.
Henry:2006:TFA
[2543] Paul A. Henry. Two-factor au-thentication — a look behind theheadlines. Network Security, 2006(4):18–19, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2547] Sarah Hilley. Secret Service dis-mantles web forums. Network Secu-rity, 2006(4):20, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703610.
Anonymous:2006:NMS
[2548] Anonymous. New McAfee study re-veals risk of using search engines.Network Security, 2006(5):1–2, May2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485806703798.
Anonymous:2006:HE
[2549] Anonymous. Hacker to be extradited.Network Security, 2006(5):2, May2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485806703804.
Anonymous:2006:MWS
[2550] Anonymous. Mac and Windowssystems at risk. Network Secu-rity, 2006(5):2, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703816.
Anonymous:2006:MMC
[2551] Anonymous. Money makes e-crimego round. Network Security, 2006(5):2, 20, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703828.
Anonymous:2006:Be
[2552] Anonymous. In brief. Network Secu-rity, 2006(5):3, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580670383X.
Bergman:2006:SBN
[2553] Alisa Bergman and Agnieszka Ver-let. Security breaches: to no-tify or not to notify — that isthe question. Network Security,2006(5):4–6, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703841.
Rana:2006:SVOb
[2554] Omer Rana and Jeremy Hilton.Securing the virtual organization,Part 2 — grid computing in ac-tion. Network Security, 2006
REFERENCES 324
(5):6–10, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2556] Valerie Surgenor. Setting the recordsstraight . . . and staying on the rightside of the law. Network Security,2006(5):13–15, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703877.
Walker:2006:BCO
[2557] Alan Walker. Business continuityand outsourcing — moves to takeout the risk. Network Security,2006(5):15–17, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703889.
Potter:2006:TTA
[2558] Bruce Potter. The times they area’changing: trends that impact se-curity strategy. Network Security,2006(5):18–19, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703890.
Murton:2006:CGH
[2559] Daniel Murton. Crypto goes to theheart. Network Security, 2006(5):19, May 2006. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
[2561] Anonymous. Success for quantumencryption? Network Security,2006(5):20, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703920.
Hilley:2006:FYC
[2562] Sarah Hilley. Five years for Cal-ifornian botmaster. Network Secu-rity, 2006(6):1–2, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703932.
McKenna:2006:RWS
[2563] Brian McKenna. Real world se-curity model for infosec, says Mi-crosoft security guru. Network Secu-rity, 2006(6):2, June 2006. CODEN
[2565] Anonymous. In brief. Network Secu-rity, 2006(6):3, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806703968.
Emm:2006:FTH
[2566] David Emm. Focus on Trojans — hold-ing data to ransom. Network Secu-rity, 2006(6):4–7, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580670397X.
Forte:2006:EPS
[2567] Dario Forte. Endpoint and perime-ter security: a new symbiosis. Net-work Security, 2006(6):7–8, June 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485806703981.
Ernest-Jones:2006:PSP
[2568] Terry Ernest-Jones. Pinning downa security policy for mobile data.
[2573] Anonymous. Is Apple the best se-curity of all? Network Security,2006(7):1–2, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2578] Wade Alcorn. Cross-site script-ing viruses and worms — a newattack vector. Network Security,2006(7):7–8, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704093.
Watson:2006:SPS
[2579] Ian Watson. Securing portablestorage devices. Network Security,2006(7):8–11, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580670410X.
Small:2006:USR
[2580] Mike Small. Unify and sim-plify: re-thinking identity man-agement. Network Security, 2006(7):11–14, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704111.
Gordon-Smith:2006:VMP
[2581] Matt Gordon-Smith and StephenWing. VoIP and multimedia pro-tocols in wireless and firewalled en-vironments. Network Security, 2006(7):14–17, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704123.
Bech:2006:SLD
[2582] Soeren Bech. Shedding light on darktraffic attacks. Network Security,
REFERENCES 327
2006(7):17–19, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704135.
Anonymous:2006:DSW
[2583] Anonymous. Data security worriesstill top the list. Network Secu-rity, 2006(7):20, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704147.
Anonymous:2006:JHD
[2584] Anonymous. Just 12% of handhelddevices encrypted. Network Secu-rity, 2006(7):20, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2605] Anonymous. Microsoft to the fore atISSE 2006. Network Security, 2006(10):1–2, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2609] Michael Marsanu. Is size still a problemfor wireless LANs? Network Security,2006(10):6–8, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704408.
Surgenor:2006:PDS
[2610] Valerie Surgenor. The price of datasharing. Network Security, 2006(10):8–10, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580670441X.
Boyd:2006:RBK
[2611] Chris Boyd. Rogue browsers — keep-ing Browsezilla & Co at bay. Network
[2612] Paul Williams. Cappuccino, muf-fin, WiFi — but what about thesecurity? Network Security, 2006(10):13–17, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704433.
Murfitt:2006:CTI
[2613] Martin Murfitt. The case for atiered internal network. Network Se-curity, 2006(10):17–20, October 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2618] Anonymous. In brief. Network Se-curity, 2006(11):3, November 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485806704494.
Emm:2006:MMN
[2619] David Emm. Mobile malware —new avenues. Network Security, 2006(11):4–6, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704500.
Furnell:2006:SHW
[2620] Steven Furnell and Network Re-search Group. Securing the homeworker. Network Security, 2006(11):6–12, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 331
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704512.
Wood:2006:SUW
[2621] Peter Wood. In search of the un-crackable Windows password. NetworkSecurity, 2006(11):12–13, November2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2623] Bruce Potter. The changing face ofIT security. Network Security, 2006(11):16–17, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485806704548.
Dunn:2006:PLP
[2624] Kev Dunn. Poor lockdown prac-tices pave the way to the domaincontroller. Network Security, 2006(11):18–20, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2628] Anonymous. In brief. Network Se-curity, 2006(12):3, December 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485806704597.
Dean:2006:IMB
[2629] Roger Dean. Identity management —back to the user. Network Security,2006(12):4–7, December 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2640] Simon Heron. Working the botnet:how dynamic DNS is revitalising thezombie army. Network Security, 2007(1):9–11, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700053.
Kinge:2007:FSU
[2641] Steve Kinge. Freedom of speech: Us-ing speech biometrics for user ver-ification. Network Security, 2007(1):12–14, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700065.
Forte:2007:SSI
[2642] Dario Forte. Security standardiza-tion in incident management: the ITILapproach. Network Security, 2007(1):14–16, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700077.
Potter:2007:RVB
[2643] Bruce Potter. Running Vista — bigOS, big change. Network Security,2007(1):17–18, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700089.
Casey:2007:BSI
[2644] Donal Casey. Building a se-cure instant messaging environ-ment. Network Security, 2007(1):18–20, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2646] Anonymous. Security through un-certainty. Network Security, 2007(2):1, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700119.
Anonymous:2007:PTC
[2647] Anonymous. Pen test certifications pre-pare to compete. Network Security,2007(2):1–2, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700120.
Anonymous:2007:RNS
[2648] Anonymous. Root name servers comeunder attack. Network Security,2007(2):2, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 334
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700132.
Anonymous:2007:PWT
[2649] Anonymous. Peacomm worm takesnet by surprise. Network Security,2007(2):2, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700144.
Anonymous:2007:Bb
[2650] Anonymous. In brief. NetworkSecurity, 2007(2):3, February 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485807700156.
Harrison:2007:STU
[2651] Keith Harrison, Bill Munro, andTim Spiller. Security through un-certainty. Network Security, 2007(2):4–7, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700168.
Fafinski:2007:SRP
[2652] Stefan Fafinski. The security ram-ifications of the Police and JusticeAct 2006. Network Security, 2007(2):8–11, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580770017X.
Potter:2007:WDG
[2653] Bruce Potter. The widening disclo-sure gap. Network Security, 2007(2):11–12, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700181.
Davis:2007:AAA
[2654] Adrian Davis. Authentication acrossthe airwaves. Network Security, 2007(2):13–19, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700193.
Forte:2007:NED
[2655] Dario Forte. The negative effects of e-discovery rules. Network Security, 2007(2):19–20, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2657] Anonymous. Vista security ver-dicts roll in. Network Security,2007(3):1–2, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2661] Ross Westcott. Maximizing the ROIof a security audit. Network Security,2007(3):8–11, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700260.
deVries:2007:STS
[2662] Stephen de Vries. Software test-ing for security. Network Security,2007(3):11–15, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700272.
Storey:2007:NDS
[2663] Dominic Storey. Network dis-covery and its security applica-tions. Network Security, 2007(3):15–18, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700284.
Potter:2007:OCN
[2664] Bruce Potter. Our changing net-work borders. Network Security, 2007(3):18–20, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2666] Anonymous. Symantec tracks commer-cialisation of malware. Network Secu-rity, 2007(4):1–2, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700399.
Anonymous:2007:ACP
[2667] Anonymous. Animated cursor pointsto trouble for Microsoft. Network Se-curity, 2007(4):2, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 336
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700405.
Anonymous:2007:UPP
[2668] Anonymous. UK plc pinpoints IM,VoIP as security risks. Network Secu-rity, 2007(4):2, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700417.
Anonymous:2007:Bd
[2669] Anonymous. In brief. Network Secu-rity, 2007(4):3, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700429.
Rowan:2007:AFF
[2670] Tom Rowan. Application firewalls:filling the void. Network Security,2007(4):4–7, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700430.
Owen:2007:FOR
[2671] Michael Owen. Fun with onionrouting. Network Security, 2007(4):8–12, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700442.
Heron:2007:BCC
[2672] Simon Heron. Botnet command andcontrol techniques. Network Security,2007(4):13–16, April 2007. CODEN
[2673] Anonymous. Data breach activityis getting worse. Network Security,2007(4):16, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700466.
delaCuadra:2007:GM
[2674] Fernando de la Cuadra. The geneal-ogy of malware. Network Security,2007(4):17–20, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2678] Kent Anderson. Convergence: aholistic approach to risk management.Network Security, 2007(5):4–7, May2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485807700338.
Gleave:2007:MLI
[2679] Stephen Gleave. The mechanics oflawful interception. Network Secu-rity, 2007(5):8–11, May 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580770034X.
Potter:2007:BGS
[2680] Bruce Potter and Shmoo Group. Be-ing a good security citizen. Net-work Security, 2007(5):11–12, May2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485807700351.
Everett:2007:TFO
[2681] Bernard Everett. Tapping into fi-bre optic cables. Network Security,2007(5):13–16, May 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2684] Anonymous. FBI still lax on se-curity. Network Security, 2007(6):1–2, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700491.
Anonymous:2007:BBB
[2685] Anonymous. Better Business Bureauphishing attacks continue. Network Se-curity, 2007(6):2, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700508.
Anonymous:2007:Bf
[2686] Anonymous. In brief. Network Secu-rity, 2007(6):3, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580770051X.
REFERENCES 338
Heron:2007:RRK
[2687] Simon Heron. The rise and rise ofthe keyloggers. Network Security,2007(6):4–6, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700521.
Munro:2007:WW
[2688] Ken Munro. Wireless worms. Net-work Security, 2007(6):6–8, June 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485807700533.
Owen:2007:NBC
[2689] Michael Owen and Colin Dixon.A new baseline for cardholder se-curity. Network Security, 2007(6):8–12, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700545.
Dantu:2007:SMN
[2690] Ram Dantu, Herman Oosterwijk,Prakash Kolan, and Husain Husna.Securing medical networks. Net-work Security, 2007(6):13–16, June2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485807700557.
LeVine:2007:PSS
[2691] Richard LeVine. Putting the spiritinto security. Network Security,2007(6):17–20, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),
[2694] Anonymous. YouTube hit by se-curity concerns. Network Security,2007(7):1–2, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700594.
Anonymous:2007:MPN
[2695] Anonymous. MPack packs a nastypunch. Network Security, 2007(7):2, July 2007. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485807700600.
Anonymous:2007:Bg
[2696] Anonymous. In brief. Network Secu-rity, 2007(7):3, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 339
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700612.
Clark:2007:DMT
[2697] Andrew J. Clark. Document metadata,tracking and tracing. Network Secu-rity, 2007(7):4–7, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700624.
Potter:2007:AWB
[2698] Bruce Potter. Alternative webbrowsers: friend or foe? Network Secu-rity, 2007(7):7–8, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700636.
Badra:2007:AWC
[2699] Mohamad Badra. Alternative wire-less client authentication and key dis-tribution. Network Security, 2007(7):9–13, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2705] Anonymous. In brief. Network Secu-rity, 2007(8):3, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700703.
REFERENCES 340
Frith:2007:SAO
[2706] David Frith. Steganography ap-proaches, options, and implica-tions. Network Security, 2007(8):4–7, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700715.
Coursen:2007:FMM
[2707] Shane Coursen. The future of mo-bile malware. Network Security, 2007(8):7–11, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700727.
Williams:2007:EBR
[2708] Paul Williams. Executive andboard roles in information secu-rity. Network Security, 2007(8):11–14, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700739.
Hwang:2007:HDM
[2709] Tim Hwang. Herdict: a dis-tributed model for threats on-line. Network Security, 2007(8):15–18, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807700740.
Potter:2007:MSR
[2710] Bruce Potter. Mobile security risks:ever evolving. Network Security, 2007
(8):19–20, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2735] Anonymous. In brief. Network Se-curity, 2007(11):3, November 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808700370.
Heron:2007:GCO
[2736] Simon Heron. Gang culture in theonline world. Network Security, 2007(11):4–7, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700382.
Watson:2007:EWA
[2737] David Watson. The evolution ofweb application attacks. NetworkSecurity, 2007(11):7–12, November2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808700394.
Moyle:2007:BTS
[2738] Steve Moyle. The blackhat’s toolbox:SQL injections. Network Security, 2007(11):12–14, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700400.
Frith:2007:VSH
[2739] David Frith. E-voting security: hopeor hype? Network Security, 2007(11):14–16, November 2007. CODEN
[2740] Miles Clement. Issues in endpoint se-curity. Network Security, 2007(11):17–18, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700424.
Potter:2007:CP
[2741] Bruce Potter. From concept to pro-duction. Network Security, 2007(11):19–20, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2745] Anonymous. In brief. Network Se-curity, 2007(12):3, December 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485807701009.
Sunner:2007:RTT
[2746] Mark Sunner. The rise of targetedTrojans. Network Security, 2007(12):4–7, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485807701010.
Newman:2007:HIS
[2747] Kenneth Newman. Home invasion: se-curing home access to business net-works. Network Security, 2007(12):8–10, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2756] Anonymous. Microsoft tests inkypassword solution. Network Security,2008(1):2, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700035.
Anonymous:2008:Ba
[2757] Anonymous. In brief. Network Secu-rity, 2008(1):3, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700047.
Munro:2008:SCS
[2758] Ken Munro. SCADA — a criticalsituation. Network Security, 2008(1):4–6, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700059.
Potter:2008:CJC
[2759] Bruce Potter. Controlling JavaScriptwith Caja. Network Security, 2008(1):7–8, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700060.
Ullrich:2008:DWS
[2760] Johannes B. Ullrich and Jason Lam.Defacing websites via SQL injec-tion. Network Security, 2008(1):9–10, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700072.
Dunne:2008:ITB
[2761] Nollaig Dunne. ID theft for be-ginners. Network Security, 2008(1):10–13, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700084.
Small:2008:ME
[2762] Mike Small. Managing entitle-ments. Network Security, 2008(1):13–17, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700096.
Bridges:2008:CFM
[2763] Lloyd Bridges. The changing faceof malware. Network Security, 2008(1):17–20, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),
[2777] Anonymous. Microsoft downplaysBitLocker claim. Network Security,2008(3):2, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700242.
Anonymous:2008:GUD
[2778] Anonymous. Google unveils drive-by download details. Network Secu-rity, 2008(3):2, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700254.
Anonymous:2008:PEC
[2779] Anonymous. Ponemon evaluates costof UK breaches. Network Security,2008(3):2, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700266.
Anonymous:2008:Bc
[2780] Anonymous. In brief. Network Secu-rity, 2008(3):3, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700278.
Dye:2008:WAS
[2781] Kerry Dye. Website abuse for searchengine optimisation. Network Secu-rity, 2008(3):4–6, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580870028X.
Corrons:2008:EMR
[2782] Luis Corrons and Dominic Hoskins. Ex-ploring MBR rootkits. Network Secu-rity, 2008(3):7–9, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700291.
REFERENCES 348
Potter:2008:SRE
[2783] Bruce Potter. Is security really every-one’s responsibility? Network Security,2008(3):9–10, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700308.
Fyffe:2008:AIT
[2784] George Fyffe. Addressing the in-sider threat. Network Security, 2008(3):11–14, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580870031X.
Heron:2008:PMR
[2785] Simon Heron. Parasitic mal-ware: The resurgence of an oldthreat. Network Security, 2008(3):15–18, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700321.
Forte:2008:SST
[2786] Dario Forte. Selling security to topmanagement. Network Security, 2008(3):18–20, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2792] Anonymous. In brief. Network Secu-rity, 2008(4):3, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
REFERENCES 349
//www.sciencedirect.com/science/
article/pii/S1353485808700497.
Miller:2008:VWR
[2793] Charlie Miller. Virtual worlds,real exploits. Network Security,2008(4):4–6, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700503.
Smith:2008:CFI
[2794] Don Smith. The challenge of federatedidentity management. Network Secu-rity, 2008(4):7–9, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700515.
Forte:2008:PAA
[2795] Dario V. Forte. The PTK: Analternative advanced interface forSleuth Kit. Network Security, 2008(4):10–13, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700527.
Howard:2008:MWA
[2796] Fraser Howard. Modern web at-tacks. Network Security, 2008(4):13–15, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700539.
Fyffe:2008:MMC
[2797] George Fyffe. Managing multina-tional compliance efforts while address-
[2801] Anonymous. Researchers crackbot net secrets. Network Secu-rity, 2008(5):2, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700588.
REFERENCES 350
Anonymous:2008:BMW
[2802] Anonymous. BERR: More workto do on security. Network Secu-rity, 2008(5):2, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580870059X.
Anonymous:2008:Be
[2803] Anonymous. In brief. Network Secu-rity, 2008(5):3, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700606.
Sunner:2008:DWD
[2804] Mark Sunner. Developing world, de-veloping problems. Network Secu-rity, 2008(5):4–7, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700618.
Colley:2008:MBC
[2805] John Colley. Managing both ca-reers and risks. Network Security,2008(5):7–9, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580870062X.
Roemer:2008:TET
[2806] Kurt Roemer. Treating employ-ees as a threat. Network Security,2008(5):9–11, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700631.
Arce:2008:VMCa
[2807] Ivan Arce. Vulnerability managementat the crossroads. Network Security,2008(5):11–13, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2816] Anonymous. In brief. Network Secu-rity, 2008(6):3, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700734.
Munro:2008:BB
[2817] Ken Munro. Breaking into Blue-tooth. Network Security, 2008(6):4–6, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700746.
Frankland:2008:ISM
[2818] Jane Frankland. IT security met-rics: implementation and stan-dards compliance. Network Security,2008(6):6–9, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700758.
Arce:2008:VMCb
[2819] Ivan Arce. Vulnerability manage-ment at the crossroads, part 2. Net-work Security, 2008(6):9–12, June2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348580870076X.
Forte:2008:VDV
[2820] Dario V. Forte. Volatile data vs.data at rest: the requirements ofdigital forensics. Network Security,2008(6):13–15, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700771.
REFERENCES 352
Hardjono:2008:SEA
[2821] Thomas Hardjono. Strengthening en-terprise applications using trusted plat-form modules. Network Security,2008(6):15–18, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700783.
Potter:2008:PGI
[2822] Bruce Potter. Proxies: a goodidea whose time has passed. Net-work Security, 2008(6):19–20, June2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2824] Anonymous. Kaspersky asks for de-cryption help. Network Security,2008(7):1–2, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700813.
Anonymous:2008:VEB
[2825] Anonymous. Verizon: Externalbreaches more common. Network Se-curity, 2008(7):2, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700825.
Anonymous:2008:RES
[2826] Anonymous. Researchers encode secretmessages in VoIP calls. Network Se-curity, 2008(7):2, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700837.
Anonymous:2008:Bg
[2827] Anonymous. In brief. Network Secu-rity, 2008(7):3, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700849.
DeMarines:2008:OHD
[2828] Victor DeMarines. Obfuscation —how to do it and how to crack it.Network Security, 2008(7):4–7, July2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808700850.
Nazario:2008:DAE
[2829] Jose Nazario. DDoS attack evo-lution. Network Security, 2008(7):7–10, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700862.
Rowan:2008:SVC
[2830] Tom Rowan. The secure virtualcomputer on your keychain. Net-work Security, 2008(7):11–14, July
[2837] Anonymous. In brief. Network Secu-rity, 2008(8):3, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700941.
Takanen:2008:FM
[2838] Ari Takanen. Fuzzing for themasses. Network Security, 2008(8):4–6, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700953.
Lovet:2008:CSF
[2839] Guillaume Lovet. Cybercrime is ina state of flux. Network Security,2008(8):6–8, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700965.
REFERENCES 354
Naumann:2008:PFE
[2840] Ingo Naumann and Giles Hogben. Pri-vacy features of European eID cardspecifications. Network Security, 2008(8):9–13, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700977.
Kim:2008:SSS
[2841] Gene Kim. Seven steps to a secure vir-tual environment. Network Security,2008(8):14–18, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808700989.
Forte:2008:SMI
[2842] Dario Forte. 2008: Six months of in-formation security. Network Security,2008(8):18–20, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2844] Anonymous. Home Office: Pass go,do not collect £200. Network Security,2008(9):1–2, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701016.
Anonymous:2008:BHH
[2845] Anonymous. Black hats hit RedHat. Network Security, 2008(9):2, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701028.
Anonymous:2008:GFG
[2846] Anonymous. Google firms up Gmailsecurity. Network Security, 2008(9):2, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580870103X.
Anonymous:2008:Bi
[2847] Anonymous. In brief. Network Se-curity, 2008(9):3, September 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808701041.
Kaminsky:2008:CK
[2848] Dan Kaminsky. Catching up withKaminsky. Network Security, 2008(9):4–7, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701053.
Mansfield-Devine:2008:XIT
[2849] Steve Mansfield-Devine. OS X— is it time to start worry-ing? Network Security, 2008(9):
REFERENCES 355
7–9, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701065.
Shaikh:2008:CIDa
[2850] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, and HaoChen. Characterising intrusion detec-tion sensors. Network Security, 2008(9):10–12, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701077.
Potter:2008:DP
[2851] Bruce Potter. Document protec-tion. Network Security, 2008(9):13–14, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701089.
May:2008:AUE
[2852] Clifford May. Approaches to usereducation. Network Security, 2008(9):15–17, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701090.
Forte:2008:DSS
[2853] Dario Forte. Do storage and security goarm in arm? Network Security, 2008(9):18–19, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701107.
Anonymous:2008:CRT
[2854] Anonymous. Customer records turnup on auctioned machine. Net-work Security, 2008(9):20, September2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808701119.
Anonymous:2008:WSF
[2855] Anonymous. Web security flawsup. Network Security, 2008(9):20, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2857] Anonymous. McAfee snaps up Se-cure Computing. Network Security,2008(10):1–2, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701144.
Anonymous:2008:SEU
[2858] Anonymous. Security experts: UStrailing on cybersecurity. NetworkSecurity, 2008(10):2, October 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808701156.
REFERENCES 356
Anonymous:2008:Bj
[2859] Anonymous. In brief. NetworkSecurity, 2008(10):3, October 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808701168.
Hartley:2008:DWS
[2860] Dave Hartley. Defending Windowsservers. Network Security, 2008(10):4–8, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580870117X.
Shaikh:2008:CIDb
[2861] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, and HaoChen. Characterising intrusion detec-tion sensors, part 2. Network Security,2008(10):8–11, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701181.
Sood:2008:HKB
[2862] Aditya K. Sood. Hiding a knifebehind a smile — OBS hackingthreats. Network Security, 2008(10):12–16, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701193.
Forte:2008:OBK
[2863] Dario Forte. An overview of thebest known virtual solutions. NetworkSecurity, 2008(10):16–18, October
[2864] Bruce Potter. How bad is it? NetworkSecurity, 2008(10):18–20, October2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2883] Steve Mansfield-Devine. Danger inthe clouds. Network Security, 2008(12):9–11, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701405.
Shaikh:2008:FPR
[2884] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, andHao Chen. False positive re-sponse. Network Security, 2008(12):11–15, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485808701417.
Danahy:2008:PSG
[2885] Jack Danahy. The ‘phasing-in’ of secu-rity governance in the SDLC. NetworkSecurity, 2008(12):15–17, December2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485808701429.
Forte:2008:DFS
[2886] Dario Forte. Dealing with forensic soft-ware vulnerabilities: is anti-forensics areal danger? Network Security, 2008(12):18–20, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2888] Anonymous. Downadup worm takesnet by storm. Network Security,2009(1):1, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700017.
Anonymous:2009:NBP
[2889] Anonymous. New botnets on theprowl. Network Security, 2009(1):2, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700029.
Anonymous:2009:PCA
[2890] Anonymous. Proof of concept attackfurther discredits MD5. Network Secu-rity, 2009(1):2, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700030.
Anonymous:2009:Ba
[2891] Anonymous. In brief. Network Secu-rity, 2009(1):3, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700042.
Erasmus:2009:AMA
[2892] Jacques Erasmus. Anatomy of amalware attack. Network Security,2009(1):4–7, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700054.
Schipka:2009:DD
[2893] Maksym Schipka. Dollars for down-loading. Network Security, 2009(1):7–11, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700066.
Heron:2009:TSD
[2894] Simon Heron. Technologies for spamdetection. Network Security, 2009(1):11–15, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700078.
Potter:2009:MST
[2895] Bruce Potter. Microsoft SDL ThreatModelling Tool. Network Security,2009(1):15–18, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580970008X.
Forte:2009:WGG
[2896] Dario Forte. So are we go-ing to govern this security busi-ness? Network Security, 2009(1):18–20, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),
[2902] Tom Rowan. Password protection: thenext generation. Network Security,2009(2):4–7, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700157.
Broom:2009:PIE
[2903] Alastair Broom. De-perimeterisation:inevitable and essential. Network Se-curity, 2009(2):7–10, February 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809700169.
Biro:2009:WW
[2904] Tamas Biro. A window to theworld? Network Security, 2009(2):11–13, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700170.
Sood:2009:VPW
[2905] Aditya K. Sood. From vulnerabil-ity to patch: the window of ex-posure. Network Security, 2009(2):14–16, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700182.
REFERENCES 361
Potter:2009:TTY
[2906] Bruce Potter. Three tips for yournetwork. Network Security, 2009(2):16–18, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700194.
Forte:2009:DM
[2907] Dario Forte. The death of MD5. Net-work Security, 2009(2):18–20, February2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2914] Ori Eisen. In-session phishing andknowing your enemy. Network Security,2009(3):8–11, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700273.
Sood:2009:YSP
[2915] Aditya K. Sood. Is your systempwned? Network Security, 2009(3):11–13, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700285.
REFERENCES 362
Southern:2009:CRM
[2916] Steve Southern. Creating riskmanagement strategies for IT se-curity. Network Security, 2009(3):13–16, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700297.
Forte:2009:SAM
[2917] Dario Forte. Security audits in mixedenvironments. Network Security, 2009(3):17–19, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700303.
Anonymous:2009:MBS
[2918] Anonymous. McAfee: Beware thespam of March. Network Security,2009(3):20, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2923] Anonymous. In brief. Network Secu-rity, 2009(4):3, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700364.
Jenik:2009:CEM
[2924] Aviram Jenik. Cyberwar in Estoniaand the Middle East. Network Secu-rity, 2009(4):4–6, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700376.
Mansfield-Devine:2009:SWF
[2925] Steve Mansfield-Devine. Simple web-site footprinting. Network Security,2009(4):7–9, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 363
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700388.
Dwyer:2009:CCA
[2926] Dennis Dwyer. Chinese cyber-attacktools continue to evolve. Network Secu-rity, 2009(4):9–11, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580970039X.
Heron:2009:GP
[2927] Simon Heron. A good policy. Net-work Security, 2009(4):12–14, April2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809700406.
Mattsson:2009:RSV
[2928] Ulf Mattsson. Real security for vir-tual machines. Network Security,2009(4):15–17, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700418.
Forte:2009:APA
[2929] Dario Forte. Anatomy of a phishingattack: a high-level overview. Net-work Security, 2009(4):17–19, April2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[2933] Anonymous. Security groups launchanti-malware effort. Network Secu-rity, 2009(5):1–2, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700467.
Anonymous:2009:GGA
[2934] Anonymous. Gumblar Google attacktakes web by storm. Network Secu-rity, 2009(5):2, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2937] Anonymous. In brief. Network Secu-rity, 2009(5):3, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700509.
Jenik:2009:FTM
[2938] Aviram Jenik. Fuzzing tools: makingsense out of nonsense. Network Secu-rity, 2009(5):4–6, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700510.
Rodriguez:2009:CCT
[2939] Bruno Rodriguez. The cyber-crimethreat to online transactions. Net-work Security, 2009(5):7–8, May 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809700522.
Khan:2009:RTC
[2940] Shafiullah Khan and Kok-Keong Loo.Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wire-less mesh networks. Network Secu-rity, 2009(5):9–16, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700534.
Walters:2009:JD
[2941] Richard Walters. Joining thedots. Network Security, 2009(5):16–19, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2950] Steve Gold. Not-so-smart me-ters? Network Security, 2009(6):9–11, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700637.
Shaikh:2009:TSI
[2951] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, andHao Chen. Towards scalable intru-sion detection. Network Security,2009(6):12–16, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700649.
Rexworthy:2009:IDS
[2952] Ben Rexworthy. Intrusion detectionssystems — an outmoded network pro-tection model. Network Security,2009(6):17–19, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2956] Anonymous. In a recession, disgrun-tled employees could pose a securitythreat from within. Network Secu-rity, 2009(7):1, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700807.
Anonymous:2009:FPN
[2957] Anonymous. Finger pointed at NorthKorea after denial of service attacks onthe South and the US. Network Secu-rity, 2009(7):1–2, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700819.
Anonymous:2009:NCV
[2958] Anonymous. NHS computer virusesimpact on patient healthcare. Net-work Security, 2009(7):2, July 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
(7):8–12, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580970087X.
Goucher:2009:EW
[2964] Wendy Goucher. The enemywithin. Network Security, 2009(7):12–14, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700881.
Potter:2009:RL
[2965] Bruce Potter. A review of L0phtCrack6. Network Security, 2009(7):14–17, July 2009. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485809700893.
Forte:2009:ILF
[2966] Dario Forte. The importance oflog files in security incident pre-vention. Network Security, 2009(7):18–20, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2969] Anonymous. Flaws and patchingin Las Vegas. Network Security,2009(8):1–2, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700704.
Anonymous:2009:RNM
[2970] Anonymous. Rogueware now amajor menace. Network Security,2009(8):2, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700716.
Anonymous:2009:Bh
[2971] Anonymous. In brief. Network Secu-rity, 2009(8):3, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700728.
Forte:2009:RIS
[2972] Dario V. Forte. The role of the Infor-mation Security Manager in cutting-edge companies. Network Security,2009(8):4–5, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),
[2974] Daniel Joseph Barry. Specialproblems of securing 10Gbps net-works. Network Security, 2009(8):8–11, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700753.
Frankland:2009:NDI
[2975] Jane Frankland. Numeric dataintegrity: piercing the corporateveil. Network Security, 2009(8):11–14, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700765.
Sloan:2009:SVW
[2976] Kevin Sloan. Security in a virtu-alised world. Network Security, 2009(8):15–18, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700777.
Gold:2009:SCS
[2977] Steve Gold. The SCADA chal-lenge: securing critical infrastruc-ture. Network Security, 2009(8):18–20, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[2982] Anonymous. US lab develops fed-erated model for defence against cy-ber attack. Network Security, 2009(9):2, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700959.
Anonymous:2009:Bi
[2983] Anonymous. In brief. Network Se-curity, 2009(9):3, September 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809700960.
Abraham:2009:WC
[2984] Dave Abraham. Why 2FA in thecloud? Network Security, 2009(9):4–5, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700972.
Garlick:2009:HBO
[2985] Nick Garlick and Nebulas SolutionsGroup. The hidden benefits of opti-mising your firewall. Network Security,2009(9):6–9, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700984.
Everett:2009:MAD
[2986] Cath Everett. Moving across to thedark side. Network Security, 2009(9):10–12, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809700996.
Sridevi:2009:NAE
[2987] R. Sridevi, A. Damodaram, andS. V. L. Narasimham. A novelarchitecture for enhanced securitythrough virtualisation and spoof-ing. Network Security, 2009(9):12–16, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348580970100X.
Forte:2009:CVB
[2988] Dario Forte. Compliance vs busi-ness security. Network Security, 2009(9):16–18, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701011.
Goucher:2009:CSS
[2989] Wendy Goucher. Carpe sus: secu-rity in the time of swine flu. NetworkSecurity, 2009(9):18–20, September2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809701023.
Anonymous:2009:ECi
[2990] Anonymous. Events calendar. Net-work Security, 2009(9):20, September
[2991] Anonymous. Wireless researchers learnto see through walls. Network Security,2009(10):1–2, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701047.
Anonymous:2009:DNF
[2992] Anonymous. DHS needs to fixweb site security. Network Security,2009(10):2, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701059.
Anonymous:2009:SBM
[2993] Anonymous. Spam-borne malware ison the rise. Network Security, 2009(10):2, 19, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701060.
Anonymous:2009:Bj
[2994] Anonymous. In brief. NetworkSecurity, 2009(10):3, October 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809701072.
Lowe:2009:SPB
[2995] Nick Lowe. Shields up! Pro-tecting browsers, endpoints and
enterprises against web-based at-tacks. Network Security, 2009(10):4–7, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701084.
Walsh:2009:BFC
[2996] Patrick J. Walsh. The brighten-ing future of cloud security. Net-work Security, 2009(10):7–10, October2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809701096.
Storey:2009:SPC
[2997] Dominic Storey. Securing process con-trol networks. Network Security, 2009(10):10–13, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701102.
Agrawal:2009:MVO
[2998] A. Agrawal and R. A. Khan. Mea-suring the vulnerability of an object-oriented design. Network Security, 2009(10):13–17, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701114.
Forte:2009:SVR
[2999] Dario Forte. SSL VPN and re-turn on investment: a possible com-bination. Network Security, 2009(10):17–19, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 371
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701126.
Anonymous:2009:AMS
[3000] Anonymous. Advertising malwarescammers get smarter. Network Se-curity, 2009(10):19–20, October 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809701138.
Anonymous:2009:ELD
[3001] Anonymous. Europe leaves dooropen for three-strikes policy. Net-work Security, 2009(10):20, October2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3005] Anonymous. Web applicationsvulnerabilities severe, says Cen-zic. Network Security, 2009(11):2, 20, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701187.
Anonymous:2009:Bk
[3006] Anonymous. In brief. Network Se-curity, 2009(11):3, November 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485809701199.
Iyer:2009:NAS
[3007] Sudha Iyer. New approaches to secur-ing the database. Network Security,2009(11):4–8, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701205.
Jones:2009:RMT
[3008] Andy Jones. Recycling more than yourIT equipment. Network Security, 2009(11):8–9, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485809701217.
REFERENCES 372
Xirasagar:2009:SIN
[3009] Sindhu Xirasagar and Masoud Moj-tahed. Securing IP networks, PartI. Network Security, 2009(11):10–14, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3011] Dario Forte. Is it really importantto have a structured security bud-get? Network Security, 2009(11):18–20, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3019] Seung S. Yang and Hongsik Choi. Acomplement to the GridOne authenti-cation method. Network Security, 2009(12):12–18, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700076.
Forte:2009:ADP
[3020] Dario Forte. Application deliv-ery: pros and cons both virtual andreal. Network Security, 2009(12):18–20, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3029] Dario V. Forte. The respon-sibilities of an incident respon-der. Network Security, 2010(1):18–19, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700179.
Anonymous:2010:OCR
[3030] Anonymous. Online criminals replacingbrawn with brain. Network Security,2010(1):20, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3032] Anonymous. New Internet Explorerbug emerges. Network Security, 2010(2):1–2, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700209.
Anonymous:2010:SCB
[3033] Anonymous. SpyEye continues bat-tle of the botnets. Network Security,2010(2):2, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700210.
Anonymous:2010:Bb
[3034] Anonymous. In brief. NetworkSecurity, 2010(2):3, February 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485810700222.
Brandt:2010:WAA
[3035] Andrew Brandt and Zachary Wolff.When admins attack: 30 hoursin the life of a Gumblar vic-tim. Network Security, 2010(2):4–8, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700234.
Rowan:2010:NWS
[3036] Tom Rowan. Negotiating WiFisecurity. Network Security, 2010(2):8–12, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700246.
REFERENCES 375
Goode:2010:MMS
[3037] Alan Goode. Managing mobile se-curity: How are we doing? Net-work Security, 2010(2):12–15, February2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485810700258.
McPherson:2010:CGC
[3038] Danny McPherson. Cybercrime— a game of cat and mouse in2009. Network Security, 2010(2):15–18, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581070026X.
Forte:2010:PIH
[3039] Dario Forte. Preventing and investi-gating hacking by auditing web ap-plications. Network Security, 2010(2):18–20, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3043] Anonymous. SSD used to speed uppassword cracking. Network Secu-rity, 2010(3):2, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700313.
Anonymous:2010:Bc
[3044] Anonymous. In brief. Network Secu-rity, 2010(3):3, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700325.
Mansfield-Devine:2010:DCT
[3045] Steve Mansfield-Devine. Divide andconquer: the threats posed by hybridapps and HTML 5. Network Secu-rity, 2010(3):4–6, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700337.
Wicherski:2010:PLI
[3046] Georg Wicherski. Placing a low-interaction honeypot in-the-wild: A re-
REFERENCES 376
view of mwcollectd. Network Secu-rity, 2010(3):7–8, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700349.
Janssen:2010:VS
[3047] Robert Janssen. VDI and se-curity. Network Security, 2010(3):8–11, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700350.
Corrons:2010:RRN
[3048] Luis Corrons. The rise and riseof NDR. Network Security, 2010(3):12–16, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700362.
Chandra:2010:CCO
[3049] S. Chandra and R. A. Khan. Confi-dentiality checking an object-orientedclass hierarchy. Network Security,2010(3):16–20, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3054] Anonymous. In brief. Network Secu-rity, 2010(4):3, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700428.
Portnoy:2010:PWA
[3055] Aaron Portnoy. Pwn2Own wrapup and analysis. Network Security,2010(4):4–5, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 377
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581070043X.
Wood:2010:BWS
[3056] Paul Wood. Bot wars: the spam-mers strike back. Network Security,2010(4):5–8, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700441.
Cluley:2010:SMT
[3057] Graham Cluley. Sizing up the mal-ware threat — key malware trendsfor 2010. Network Security, 2010(4):8–10, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700453.
Eisen:2010:CFM
[3058] Ori Eisen. Catching the fraud-ulent Man-in-the-Middle and Man-in-the-Browser. Network Security,2010(4):11–12, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700465.
Carnie:2010:PSM
[3059] James Carnie. Preserving securityin a multi-tenanted hosting envi-ronment. Network Security, 2010(4):12–15, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700477.
Vlissidis:2010:TCS
[3060] Paul Vlissidis and Matthew Hickey.Thin clients: slim security? Net-work Security, 2010(4):16–19, April2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3063] Anonymous. Facebook under at-tack on all fronts. Network Secu-rity, 2010(5):1–2, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700519.
Anonymous:2010:GAS
[3064] Anonymous. Google ‘accidentally’snooped on wifi data. Network Secu-rity, 2010(5):2, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700520.
REFERENCES 378
Anonymous:2010:Be
[3065] Anonymous. In brief. Network Secu-rity, 2010(5):3, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700532.
Mansfield-Devine:2010:BB
[3066] Steve Mansfield-Devine. Battle ofthe botnets. Network Security,2010(5):4–6, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700544.
Steiner:2010:WFN
[3067] Paul Steiner. Why FTP is no longerup to the job. Network Security,2010(5):7–9, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700556.
Heron:2010:DSM
[3068] Simon Heron. Denial of service: moti-vations and trends. Network Security,2010(5):10–12, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700568.
Davis:2010:MTP
[3069] Adrian Davis. Managing third par-ties — an information security per-spective. Network Security, 2010(5):13–15, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581070057X.
Bradbury:2010:SCC
[3070] Danny Bradbury. Shadows in thecloud: Chinese involvement in ad-vanced persistent threats. NetworkSecurity, 2010(5):16–19, May 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3076] Anonymous. Reduce IT security costswithout increasing risk. Network Secu-rity, 2010(6):1–2, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700763.
Anonymous:2010:NVH
[3077] Anonymous. New ventures help devel-opers in fight against security flaws.Network Security, 2010(6):2, June2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485810700775.
Anonymous:2010:WFD
[3078] Anonymous. Windows flaw disclosurecauses fierce debate. Network Secu-rity, 2010(6):2, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700787.
Anonymous:2010:Bf
[3079] Anonymous. In brief. Network Secu-rity, 2010(6):3, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700799.
Karrenberg:2010:DSG
[3080] Daniel Karrenberg. DNSSEC: Se-curing the global infrastructure ofthe Internet. Network Security,2010(6):4–6, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700805.
Aljawarneh:2010:SWS
[3081] Shadi Aljawarneh, Shadi Masadeh, andFaisal Alkhateeb. A secure wifi sys-tem for wireless networks: an experi-mental evaluation. Network Security,2010(6):6–12, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700817.
Bradbury:2010:HSW
[3082] Danny Bradbury. A hole in the securitywall: ATM hacking. Network Security,2010(6):12–15, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700829.
Hamelin:2010:PFM
[3083] Michael Hamelin. Preventing fire-wall meltdowns. Network Security,2010(6):15–16, June 2010. CODEN
[3092] Danny Bradbury. Hands-on withMetasploit Express. Network Secu-rity, 2010(7):7–11, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700921.
REFERENCES 381
Schiavo:2010:CSE
[3093] Jay Schiavo. Code signing for end-user peace of mind. Network Security,2010(7):11–13, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700933.
Eisen:2010:OSN
[3094] Ori Eisen. Online security — a newstrategic approach. Network Security,2010(7):14–15, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700945.
Ward:2010:CSM
[3095] Des Ward. The cost of savingmoney: no longer the company rep-utation. Network Security, 2010(7):15–19, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810700957.
Anonymous:2010:DND
[3096] Anonymous. Disclosure and non-disclosure. Network Security, 2010(7):19–20, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3101] Anonymous. Black Hat and DefConhighlights. Network Security, 2010(8):2, 20, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581070101X.
Anonymous:2010:Bh
[3102] Anonymous. In brief. Network Secu-rity, 2010(8):3, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),
[3104] Dominic Storey. Ten consequences ofnetwork blindness. Network Security,2010(8):7–9, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701045.
Kim:2010:SGF
[3105] Seong-Hwan Kim, Sundar Vedantham,and Pravin Pathak. SMB gatewayfirewall implementation using a net-work processor. Network Security,2010(8):10–15, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701057.
Smith:2010:CDS
[3106] Graham Smith. Countering datacentresecurity pressures. Network Security,2010(8):15–17, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701069.
Midgley:2010:SEE
[3107] Stephen Midgley. The state of en-cryption in Europe: some culturalcomparisons. Network Security, 2010(8):18–19, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701070.
Anonymous:2010:DMC
[3108] Anonymous. Did malware causeSpanair crash? Network Security,2010(8):20, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3111] Anonymous. Stuxnet may bethe work of state-backed hack-ers. Network Security, 2010(9):1–2, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 383
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701112.
Anonymous:2010:WLB
[3112] Anonymous. Wins and losses in thebotnet war. Network Security, 2010(9):2, 19, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701124.
Anonymous:2010:Bi
[3113] Anonymous. In brief. Network Se-curity, 2010(9):3, September 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485810701136.
Bransfield-Garth:2010:MPC
[3114] Simon Bransfield-Garth. Mobile phonecalls as a business risk. NetworkSecurity, 2010(9):4–11, September2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485810701148.
Taylor:2010:FIP
[3115] Mark Taylor, John Haggerty, DavidGresty, and Paul Fergus. Foren-sic investigation of peer-to-peer net-works. Network Security, 2010(9):12–15, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581070115X.
Gold:2010:PA
[3116] Steve Gold. Password alterna-tives. Network Security, 2010(9):16–19, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701161.
Anonymous:2010:CAF
[3117] Anonymous. Corporate attacks fo-cus on web. Network Security, 2010(9):19–20, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3123] Anonymous. In brief. NetworkSecurity, 2010(10):3, October 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485810701239.
Papadaki:2010:VMA
[3124] Maria Papadaki and Steven Furnell.Vulnerability management: an atti-tude of mind? Network Security,2010(10):4–8, October 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701240.
Perche:2010:NLA
[3125] Patrice Perche. Network latency: avoidpaying a tax on time. Network Security,2010(10):9–12, October 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701252.
Zaitsev:2010:SKP
[3126] Oleg Zaitsev. Skeleton keys: thepurpose and applications of keylog-gers. Network Security, 2010(10):12–17, October 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3132] Anonymous. In brief. Network Se-curity, 2010(11):3, November 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581070132X.
Bradbury:2010:AUH
[3133] Danny Bradbury. Avoiding URLhell. Network Security, 2010(11):4–6, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701331.
Walters:2010:MPU
[3134] Richard Walters. Managing privi-leged user activity in the datacen-tre. Network Security, 2010(11):6–10, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701343.
Gold:2010:SET
[3135] Steve Gold. Social engineeringtoday: psychology, strategies andtricks. Network Security, 2010(11):
11–14, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701355.
Boroditsky:2010:CCW
[3136] Marc Boroditsky. Click, click, who’sthere? Network Security, 2010(11):14–16, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701367.
Warmack:2010:CTT
[3137] Rob Warmack. Compliance today —and tomorrow. Network Security, 2010(11):16–18, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701379.
Cavalancia:2010:PDL
[3138] Nick Cavalancia. Preventing dataloss by securing USB ports. NetworkSecurity, 2010(11):18–20, November2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3140] Anonymous. Predictions for theNew Year. Network Security, 2010(12):1–2, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701409.
Anonymous:2010:MUM
[3141] Anonymous. More users means se-curity challenges. Network Security,2010(12):2, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701410.
Anonymous:2010:HPS
[3142] Anonymous. Higher priority for se-curity. Network Security, 2010(12):2, 20, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701422.
Anonymous:2010:Bl
[3143] Anonymous. In brief. Network Se-curity, 2010(12):3, December 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485810701434.
Dinoor:2010:PIM
[3144] Shlomi Dinoor. Privileged iden-tity management: securing the en-terprise. Network Security, 2010(12):4–6, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701446.
Ridley:2010:OSF
[3145] Philip Ridley. Outsmarting the smart-phone fraudsters. Network Security,2010(12):7–9, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701458.
Gold:2010:PCA
[3146] Steve Gold. Protecting the cloud: at-tack vectors and other exploits. Net-work Security, 2010(12):10–12, De-cember 2010. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S135348581070146X.
Furnell:2010:UVC
[3147] Steven Furnell. Usability versus com-plexity — striking the balance in end-user security. Network Security, 2010(12):13–17, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701471.
Ranum:2010:WMT
[3148] Marcus Ranum. The well-meaningthreat. Network Security, 2010(12):17–19, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485810701483.
REFERENCES 387
Anonymous:2010:UPP
[3149] Anonymous. US public-private part-nership for cyber-security. Net-work Security, 2010(12):20, December2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3160] Anonymous. Sinister trends in cy-berthreats. Network Security, 2011(2):2, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700101.
Anonymous:2011:EGR
[3161] Anonymous. European guidelines forresilience and cyber-security. NetworkSecurity, 2011(2):2, 19–20, February2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700113.
Anonymous:2011:Bb
[3162] Anonymous. In brief. NetworkSecurity, 2011(2):3, February 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700125.
Durbin:2011:ISB
[3163] Steve Durbin. Information securitywithout boundaries. Network Security,2011(2):4–8, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700137.
Bradbury:2011:HWE
[3164] Danny Bradbury. Hacking wifi theeasy way. Network Security, 2011(2):9–12, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700149.
Gold:2011:FF
[3165] Steve Gold. The future of the fire-wall. Network Security, 2011(2):13–15, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700150.
Ting:2011:TTA
[3166] David Ting. Thinking thin: ad-dressing the challenges of client com-puting. Network Security, 2011(2):16–17, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700162.
Hamelin:2011:PFA
[3167] Michael Hamelin. Preparing for a fire-wall audit. Network Security, 2011(2):18–19, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700174.
REFERENCES 389
Anonymous:2011:ZSH
[3168] Anonymous. Zeus and SpyEye hy-brid emerges. Network Security,2011(2):20, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700186.
Anonymous:2011:WMC
[3169] Anonymous. Waledac makes acomeback. Network Security, 2011(2):20, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3171] Anonymous. The resurgence of Zeusand other banking Trojans. Net-work Security, 2011(3):2, March 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700216.
Anonymous:2011:NHO
[3172] Anonymous. Nearly half of organ-isations are not protected. Net-work Security, 2011(3):2, 20, March2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700228.
Anonymous:2011:Bc
[3173] Anonymous. In brief. Network Secu-rity, 2011(3):3, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581170023X.
Taylor:2011:FIC
[3174] Mark Taylor, John Haggerty, DavidGresty, and David Lamb. Foren-sic investigation of cloud comput-ing systems. Network Security, 2011(3):4–10, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700241.
Sanderson:2011:SDP
[3175] Russell Sanderson. A secure data pro-tection strategy. Network Security,2011(3):10–12, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700253.
Aljawarneh:2011:WES
[3176] Shadi Aljawarneh. A web engi-neering security methodology for e-learning systems. Network Security,2011(3):12–15, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700265.
Gold:2011:IMS
[3177] Steve Gold. IPv6 migration andsecurity. Network Security, 2011(3):15–18, March 2011. CODEN
[3183] Anonymous. In brief. Network Secu-rity, 2011(4):3, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700332.
Anonymous:2011:BRSa
[3184] Anonymous. Book review: Secu-rity for Microsoft Windows SystemsAdministrators, by Derrick Roun-tree. Published by Syngress (ISBN978-1-59749-594-3, e-ISBN 978-1-59749-595-0). Network Security,2011(4):4, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700344.
Anonymous:2011:MWA
[3185] Anonymous. Microsoft Windows 7 ad-ministrator’s reference. Network Secu-rity, 2011(4):4, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700356.
Anonymous:2011:NBa
[3186] Anonymous. News in brief. Net-work Security, 2011(4):4, April 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3190] Richard Blandford. Information secu-rity in the cloud. Network Security,2011(4):15–17, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581170040X.
Jenkins:2011:LLS
[3191] Steve Jenkins. Learning to loveSIEM. Network Security, 2011(4):18–19, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700411.
Anonymous:2011:USU
[3192] Anonymous. Utilities still un-der threat. Network Security,2011(4):20, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3196] Anonymous. In brief. Network Secu-rity, 2011(5):3, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700460.
REFERENCES 392
Anonymous:2011:BRCa
[3197] Anonymous. Book review: Com-puter Networks: a systems approach,by Larry Peterson and Bruce Davie.Fifth Edition. Morgan Kaufman. ISBN978-0-12-385059-1. Network Secu-rity, 2011(5):4, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700472.
Anonymous:2011:NBb
[3198] Anonymous. News in brief. Net-work Security, 2011(5):4, May 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700484.
Bradbury:2011:RAC
[3199] Danny Bradbury. Routing around cen-sorship. Network Security, 2011(5):5–8, May 2011. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485811700496.
Sood:2011:SBD
[3200] Aditya K. Sood and Richard J. En-body. Spying on the browser: dis-secting the design of malicious ex-tensions. Network Security, 2011(5):8–12, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700502.
Gold:2011:TBa
[3201] Steve Gold. Taking down bot-nets. Network Security, 2011
(5):13–15, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700514.
Jammalamadaka:2011:DSM
[3202] Ravi Chandra Jammalamadaka, SharadMehrotra, Nalini Venkatasubramanian,and Kent Seamons. DataVault: se-cure mobile access and data sharing.Network Security, 2011(5):16–19, May2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700526.
Anonymous:2011:EQS
[3203] Anonymous. EU questions stabilityof the Internet. Network Security,2011(5):19–20, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700538.
Anonymous:2011:HMP
[3204] Anonymous. Hackers may be‘pimping’ data. Network Security,2011(5):20, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3207] Anonymous. Google spear-phishingtargets governments and military. Net-work Security, 2011(6):2, 20, June2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700575.
Anonymous:2011:Bf
[3208] Anonymous. In brief. Network Secu-rity, 2011(6):3, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700587.
Anonymous:2011:BRI
[3209] Anonymous. Book review: IPv6for Enterprise Networks, by Shan-non McFarland, Muninder Sambi,Nikhil Sharma, and Sanjay Hooda.Cisco Press. ISBN 978-1-58714-227-7. Network Security, 2011(6):4, June2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700599.
Anonymous:2011:BRPa
[3210] Anonymous. Book review: PKI Un-covered, Andre Karamanian, SrinivasTenneti, Francois Dessart. Cisco Press.
ISBN 978-1-58705-916-2. Network Se-curity, 2011(6):4, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700605.
Durbin:2011:TCT
[3211] Steve Durbin. Tackling convergedthreats: building a security-positiveenvironment. Network Security,2011(6):5–8, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700617.
Caldwell:2011:WWC
[3212] Tracey Caldwell. When worlds col-lide: the security of converged net-works. Network Security, 2011(6):8–12, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700629.
Hudson:2011:WMH
[3213] Jeff Hudson. Weaponised mal-ware: how criminals use digitalcertificates to cripple your organ-isation. Network Security, 2011(6):12–14, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700630.
Gold:2011:RP
[3214] Steve Gold. The rebirth of phreaking.Network Security, 2011(6):15–17, June2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 394
URL http://www.sciencedirect.
com/science/article/pii/S1353485811700642.
Hocking:2011:TCS
[3215] Marc Hocking. Thin client secu-rity in the cloud. Network Security,2011(6):17–19, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700654.
Anonymous:2011:MMA
[3216] Anonymous. More malware for An-droid. Network Security, 2011(6):20, June 2011. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
[3218] Anonymous. High costs but higherprofits with targeted attacks. Net-work Security, 2011(7):1–2, July 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581170068X.
Anonymous:2011:FTF
[3219] Anonymous. Firms turn down freedata breach audits. Network Secu-rity, 2011(7):2, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700691.
Anonymous:2011:Bg
[3220] Anonymous. In brief. Network Secu-rity, 2011(7):3, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700708.
Anonymous:2011:BRCb
[3221] Anonymous. Book review: Cisco Fire-walls, by Alexandre Moraes. CiscoPress. ISBN 978-1-58714-109-6. Net-work Security, 2011(7):4, July 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581170071X.
Anonymous:2011:BRCc
[3222] Anonymous. Book review: Cisco Fire-walls, by Alexandre Moraes. CiscoPress. ISBN 978-1-58714-109-6. Net-work Security, 2011(7):4, July 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700721.
Gold:2011:TBb
[3223] Steve Gold. Terrorism and Bluetooth.Network Security, 2011(7):5–7, July2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700733.
Gragido:2011:BZA
[3224] Will Gragido. Beyond zero: analysingthreat trends. Network Security,
REFERENCES 395
2011(7):7–9, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700745.
Caldwell:2011:EHP
[3225] Tracey Caldwell. Ethical hackers:putting on the white hat. Net-work Security, 2011(7):10–13, July2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700757.
Sreenivas:2011:DKB
[3226] R. Sreeram Sreenivas and R. Anitha.Detecting keyloggers based on traf-fic analysis with periodic behaviour.Network Security, 2011(7):14–19, July2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700769.
Anonymous:2011:WLW
[3227] Anonymous. Wins and losses inthe war on botnets. Network Secu-rity, 2011(7):20, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700770.
Anonymous:2011:AQF
[3228] Anonymous. Al-Qaeda forum knockedoffline. Network Security, 2011(7):20, July 2011. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
[3230] Anonymous. Black Hat and DefConhighlights. Network Security, 2011(8):2, 19–20, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700800.
Anonymous:2011:Bh
[3231] Anonymous. In brief. Network Secu-rity, 2011(8):3, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700812.
Anonymous:2011:BRPb
[3232] Anonymous. Book review: Prac-tical Packet Analysis: using Wire-shark to solve real-world network prob-lems, by Chris Sanders. Second Edi-tion. No Starch Press. ISBN 978-1-59327-266-1. Network Security,2011(8):4, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3234] Steve Mansfield-Devine. Hacktivism:assessing the damage. Network Se-curity, 2011(8):5–13, August 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700848.
Turiel:2011:INT
[3235] Avi Turiel. IPv6: new technology,new threats. Network Security, 2011(8):13–15, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581170085X.
Tankard:2011:APT
[3236] Colin Tankard. Advanced persistentthreats and how to monitor and de-ter them. Network Security, 2011(8):16–19, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700861.
Anonymous:2011:MUF
[3237] Anonymous. Mobile users facemounting threats. Network Security,2011(8):20, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700873.
Anonymous:2011:WAA
[3238] Anonymous. Web apps attacked ev-ery two minutes. Network Security,
2011(8):20, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3240] Anonymous. APT hype is a distrac-tion from real security needs, saysGartner. Network Security, 2011(9):1–2, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700903.
Anonymous:2011:AMA
[3241] Anonymous. Android is most-attackedmobile platform. Network Secu-rity, 2011(9):2, 20, September 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700915.
Anonymous:2011:Bi
[3242] Anonymous. In brief. Network Se-curity, 2011(9):3, September 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700927.
REFERENCES 397
Anonymous:2011:BRM
[3243] Anonymous. Book review: Metas-ploit: The Penetration Tester’s Guide,by David Kennedy, Jim O’Gorman,Devon Kearns, and Mati Aharoni.No Starch Press. ISBN 978-1-59327-288-3. Network Security, 2011(9):4, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700939.
Gold:2011:CCN
[3244] Steve Gold. Cracking cellular net-works via femtocells. Network Security,2011(9):5–8, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700940.
Everett:2011:PNT
[3245] Cath Everett. Printers: the ne-glected threat. Network Security, 2011(9):8–11, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700952.
Jammalamadaka:2011:PPD
[3246] Ravi Chandra Jammalamadaka, SharadMehrotra, and Nalini Venkatasubra-manian. Protecting personal datafrom untrusted web-based data ser-vices. Network Security, 2011(9):11–16, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811700964.
deJoode:2011:ECS
[3247] Alex de Joode. Effective corporatesecurity and cybercrime. NetworkSecurity, 2011(9):16–18, September2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811700976.
Creasey:2011:PD
[3248] Graeme Creasey. Protecting the dat-acentre. Network Security, 2011(9):18–19, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3255] Aditya K. Sood and Richard J. En-body. Frametrapping the framebust-ing defence. Network Security, 2011(10):8–12, October 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701052.
Harris:2011:DNS
[3256] James Harris. Defending the net-work several times over. Network
[3265] Anonymous. In brief. Network Se-curity, 2011(11):3, November 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485811701155.
Anonymous:2011:BRCd
[3266] Anonymous. Book review: Comp-TIA Security + Deluxe Study Guide,by Emmett Dulaney. Second edition.Sybex ISBN 978-1-118-01474-5. Net-work Security, 2011(11):4, November2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811701167.
Andrus:2011:BSB
[3267] Frank Andrus. Beyond scan and block:an adaptive approach to network ac-cess control. Network Security, 2011(11):5–9, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701179.
Thomson:2011:APU
[3268] Gordon Thomson. APTs: a poorlyunderstood challenge. Network Secu-rity, 2011(11):9–11, November 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811701180.
Gheri:2011:BAD
[3269] Klaus Gheri. The benefits of applica-tion detection. Network Security, 2011(11):12–14, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701192.
REFERENCES 400
Gold:2011:CWN
[3270] Steve Gold. Cracking wireless net-works. Network Security, 2011(11):14–18, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701209.
Facey:2011:WCS
[3271] Stuart Facey. Who’s in con-trol: a six-step strategy for secureIT. Network Security, 2011(11):18–20, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3275] Anonymous. In brief. Network Se-curity, 2011(12):3, December 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811701258.
Anonymous:2011:BRPc
[3276] Anonymous. Book review: Pene-tration Tester’s Open Source Toolkit,by Jeremy Faircloth. Third edi-tion. Syngress. ISBN 978-1-59749-627-8. Network Security, 2011(12):4, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581170126X.
Anonymous:2011:BRBb
[3277] Anonymous. Book review: The Basicsof Hacking and Penetration Testing, byPatrick Engebretson. Syngress. ISBN978-1-59749-655-1. Network Security,2011(12):4, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701271.
Mansfield-Devine:2011:DTM
[3278] Steve Mansfield-Devine. DDoS: threatsand mitigation. Network Security, 2011(12):5–12, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701283.
REFERENCES 401
DHoinne:2011:CWS
[3279] Jeremy D’Hoinne. Could ‘waitand see’ be the best IPv6 strat-egy? Network Security, 2011(12):12–14, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701295.
Gold:2011:UHP
[3280] Steve Gold. Understanding the hackerpsyche. Network Security, 2011(12):15–17, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485811701301.
Malecki:2011:DBL
[3281] Florian Malecki. A deeper, broaderlook at network security. NetworkSecurity, 2011(12):18–19, December2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485811701313.
Anonymous:2011:BBC
[3282] Anonymous. Big boost in cyber-security spending. Network Security,2011(12):20, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3286] Anonymous. In brief. Network Secu-rity, 2012(1):3, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581270003X.
Anonymous:2012:BRBa
[3287] Anonymous. Book review: A BugHunter’s Diary, by Tobias Klein.No Starch Press. ISBN 978-1-59327-385-9. Network Security, 2012(1):4, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700041.
Harley:2012:ATT
[3288] David Harley. AMTSO: the testof time? Network Security, 2012
REFERENCES 402
(1):5–10, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700053.
Woodhead:2012:MBT
[3289] Simon Woodhead. Monitoring bad traf-fic with darknets. Network Security,2012(1):10–14, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700065.
Ryan:2012:REB
[3290] Jaime Ryan. Rethinking the ESB:building a secure bus with an SOAgateway. Network Security, 2012(1):14–17, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700077.
Masadeh:2012:SMB
[3291] Shadi R. Masadeh, Nedal Turab,and Farhan Obisat. A securemodel for building e-learning sys-tems. Network Security, 2012(1):17–20, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3293] Anonymous. Hacktivists hit outat Symantec, police and anti-piracygroups. Network Security, 2012(2):1–2, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700107.
Anonymous:2012:Bb
[3294] Anonymous. In brief. NetworkSecurity, 2012(2):3, February 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700119.
Anonymous:2012:BRW
[3295] Anonymous. Book review: The WebApplication Hacker’s Handbook, 2ndEdition. Dafydd Stuttard and Mar-cus Pinto. Wiley. ISBN 978-1-118-02647-2. Network Security, 2012(2):4, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700120.
Thomson:2012:BEC
[3296] Gordon Thomson. BYOD: enablingthe chaos. Network Security, 2012(2):5–8, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700132.
Wray:2012:SCN
[3297] Melvyn Wray. From server con-solidation to network consolida-tion. Network Security, 2012(2):
REFERENCES 403
8–11, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700144.
Caviglione:2012:EIS
[3298] Luca Caviglione and Alessio Merlo.The energy impact of security mech-anisms in modern mobile devices. Net-work Security, 2012(2):11–14, February2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700156.
Schneider:2012:SNS
[3299] David Schneider. The state of net-work security. Network Security, 2012(2):14–20, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700168.
Anonymous:2012:TTS
[3300] Anonymous. Tough times forSSL. Network Security, 2012(2):20, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3302] Anonymous. Anonymous — arrests,leaks and infections. Network Secu-rity, 2012(3):2, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700399.
Anonymous:2012:Bc
[3303] Anonymous. In brief. Network Secu-rity, 2012(3):3, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700405.
Anonymous:2012:BRT
[3304] Anonymous. Book review: Thor’sMicrosoft Security Bible, by Timo-thy ‘Thor’ Mullen. Syngress. ISBN978-1-59749-572-1. Network Secu-rity, 2012(3):4, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700417.
Anonymous:2012:BRL
[3305] Anonymous. Book review: Low TechHacking: Street Smarts for SecurityProfessionals, by Jack Wiles, Terry Gu-daitis, Jennifer Jabbusch, Russ Rogers,and Sean Lowther. Syngress. ISBN978-1-59749-665-0. Network Secu-rity, 2012(3):4, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700429.
REFERENCES 404
Denman:2012:WML
[3306] Simon Denman. Why multi-layered se-curity is still the best defence. Net-work Security, 2012(3):5–7, March2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700430.
Brewer:2012:PCC
[3307] Ross Brewer. Protecting criticalcontrol systems. Network Security,2012(3):7–10, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700442.
Rouse:2012:MDM
[3308] Jason Rouse. Mobile devices —the most hostile environment for se-curity? Network Security, 2012(3):11–13, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3317] Michael de Crespigny. Building cyber-resilience to tackle threats. Net-work Security, 2012(4):5–8, April2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700247.
Tankard:2012:TMP
[3318] Colin Tankard. Taking the man-agement pain out of Active Di-rectory. Network Security, 2012(4):8–11, April 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700259.
Robertson:2012:SVL
[3319] Brian Robertson. Security: virtualisa-tion’s last frontier. Network Security,2012(4):12–15, April 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700260.
Everett:2012:EC
[3320] Bernard Everett. The encryption co-nundrum. Network Security, 2012(4):15–18, April 2012. CODEN
[3324] Anonymous. Android’s popularitymakes it a prime target. Network Se-curity, 2012(5):2, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700314.
Anonymous:2012:Be
[3325] Anonymous. In brief. Network Secu-rity, 2012(5):3, May 2012. CODEN
[3326] Anonymous. Book review: The Ba-sics of Digital Forensics, by JohnSammons. Syngress. ISBN 978-1-59749-661-2. Network Security,2012(5):4, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700338.
Anonymous:2012:BRBc
[3327] Anonymous. Book review: The Ba-sics of Digital Forensics, by JohnSammons. Syngress. ISBN 978-1-59749-661-2. Network Security,2012(5):4, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581270034X.
Mason:2012:CCS
[3328] Andrew Mason. Caught in the cross-site scripting fire. Network Secu-rity, 2012(5):5–9, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700351.
Gold:2012:WCT
[3329] Steve Gold. Wireless cracking: there’san app for that. Network Security,2012(5):10–14, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700363.
Hamamreh:2012:RPA
[3330] Rushdi Hamamreh. Routing pathauthentication in link-state routingprotocols. Network Security, 2012(5):14–20, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3335] Greg Jones. Mobile menace: why SDRposes such a threat. Network Secu-rity, 2012(6):5–7, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700521.
Kenyon:2012:WAC
[3336] Paul Kenyon. What Australiacan teach the world about leastprivilege. Network Security, 2012(6):7–10, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700533.
Bager:2012:RAD
[3337] Kurt Bager. Remote access: don’tbe a victim. Network Security,2012(6):11–14, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3341] Anonymous. Android malware growthand possible botnet. Network Secu-rity, 2012(7):1–2, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700582.
Anonymous:2012:BIC
[3342] Anonymous. Big increase in criticalinfrastructure attacks. Network Secu-rity, 2012(7):2, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700594.
Anonymous:2012:Bg
[3343] Anonymous. In brief. Network Secu-rity, 2012(7):3, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700600.
REFERENCES 408
Anonymous:2012:BRPa
[3344] Anonymous. Book review: Privacyand Big Data: the players, regu-lators and stakeholders, by TerenceCraig and Mary E. Ludloff. O’Reilly.ISBN 978-1-4493-0500-0. Network Se-curity, 2012(7):4, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700612.
Anonymous:2012:BRPb
[3345] Anonymous. Book review: Privacyand Big Data: the players, regulatorsand stakeholders, by Terence Craig,and Mary E. Ludloff. O’Reilly. ISBN978-1-4493-0500-0. Network Secu-rity, 2012(7):4, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700624.
Tankard:2012:BDS
[3346] Colin Tankard. Big data security.Network Security, 2012(7):5–8, July2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700636.
Potts:2012:SIS
[3347] Mike Potts. The state of infor-mation security. Network Security,2012(7):9–11, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700648.
Mansfield-Devine:2012:EWD
[3348] Steve Mansfield-Devine. Estonia:what doesn’t kill you makes youstronger. Network Security, 2012(7):12–20, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3350] Anonymous. Black Hat high-lights. Network Security, 2012(8):1–2, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700673.
Anonymous:2012:Bi
[3351] Anonymous. In brief. Network Secu-rity, 2012(8):3, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700685.
SM-D:2012:BRPa
[3352] SM-D. Book review: Planning forIPv6, by Silvia Hagen. O’Reilly. ISBN978-1-4493-0538-3 (e-book), 978-1-4493-0539-0 (print). Network Secu-rity, 2012(8):4, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 409
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700697.
SM-D:2012:BRPb
[3353] SM-D. Book review: Planning forIPv6, by Silvia Hagen. O’Reilly. ISBN978-1-4493-0538-3 (e-book), 978-1-4493-0539-0 (print). Network Secu-rity, 2012(8):4, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700703.
Conrad:2012:SHI
[3354] James Conrad. Seeking help: the im-portant role of ethical hackers. Net-work Security, 2012(8):5–8, August2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700715.
Caldwell:2012:PDW
[3355] Tracey Caldwell. The perimeteris dead — what next for the ap-pliance? Network Security, 2012(8):8–12, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700727.
Bradbury:2012:FBS
[3356] Danny Bradbury. Fighting botnetswith sinkholes. Network Security, 2012(8):12–15, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3362] Anonymous. In brief. Network Se-curity, 2012(9):3, September 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581270079X.
SM-D:2012:BRS
[3363] SM-D. Book review: Securing CloudServices: a pragmatic, approach tosecurity architecture in, the cloud,by Lee Newcombe. Published by ITGovernance Publishing. ISBN 978-1-84928-398-4. Network Security, 2012(9):4, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700806.
Mansfield-Devine:2012:PAJ
[3364] Steve Mansfield-Devine. Para-noid Android: just how insecureis the most popular mobile plat-form? Network Security, 2012(9):5–10, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700818.
Tankard:2012:PMS
[3365] Colin Tankard. The promise ofmanaged security services. NetworkSecurity, 2012(9):10–15, September2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581270082X.
Caldwell:2012:SD
[3366] Tracey Caldwell. Seek and de-stroy. Network Security, 2012(9):15–19, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700831.
Anonymous:2012:AMJ
[3367] Anonymous. Another major Javapanic. Network Security, 2012(9):19–20, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700843.
Anonymous:2012:NRI
[3368] Anonymous. New research instituteto study threats. Network Security,2012(9):20, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3370] Anonymous. Avoid Chinese equipmentfirms, says Congress. Network Security,2012(10):1–2, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700879.
REFERENCES 411
Anonymous:2012:MEI
[3371] Anonymous. Mobile exploits in-crease. Network Security, 2012(10):2, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700880.
Anonymous:2012:Bk
[3372] Anonymous. In brief. NetworkSecurity, 2012(10):3, October 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700892.
Anonymous:2012:BRO
[3373] Anonymous. Book review: Once MoreUnto the Breach, by Andrea C Sim-mons. IT Governance Publishing. ISBN978-1-84928-390-8. Network Security,2012(10):4, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700909.
Anonymous:2012:BRP
[3374] Anonymous. Book review: PCICompliance, Branden R. Williamsand Anton Chuvakin. Third edi-tion. Syngress. ISBN 978-1-59749-948-4. Network Security, 2012(10):4, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700910.
Mansfield-Devine:2012:AAA
[3375] Steve Mansfield-Devine. Androidarchitecture: attacking the weak
[3376] Michael Jordon. Cleaning up dirtydisks in the cloud. Network Secu-rity, 2012(10):12–15, October 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700934.
Bradbury:2012:SFF
[3377] Danny Bradbury. Spreading fear onFacebook. Network Security, 2012(10):15–17, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700946.
Bella:2012:ISA
[3378] Madeleine A. Bihina Bella, J. H. P.Eloff, and Martin S. Olivier. Im-proving system availability with near-miss analysis. Network Security, 2012(10):18–20, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3381] Anonymous. Latest Android prob-lems and fixes. Network Security,2012(11):2, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812700983.
Anonymous:2012:Bl
[3382] Anonymous. In brief. Network Se-curity, 2012(11):3, November 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812700995.
Anonymous:2012:BRR
[3383] Anonymous. Book review: Regu-lar Expressions Cookbook, Jan Goy-vaerts and Steven Levithan, Sec-ond edition, O’Reilly, ISBN 978-1-4493-1943-4. Network Security, 2012(11):4, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812701009.
Anonymous:2012:BRH
[3384] Anonymous. Book review: Hack-ing Web Apps, Mike Shema. Syn-gress. ISBN 978-1-59749-951-4. Net-work Security, 2012(11):4, November
[3385] Colin Tankard. Cultural issues in se-curity and privacy. Network Security,2012(11):5–8, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3389] Anonymous. A look back at2012. Network Security, 2012(12):
REFERENCES 413
1–2, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581270106X.
Anonymous:2012:HGA
[3390] Anonymous. How good is anti-virus? Network Security, 2012(12):2, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812701071.
Anonymous:2012:Bm
[3391] Anonymous. In brief. Network Se-curity, 2012(12):3, December 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485812701083.
SM-D:2012:BRPc
[3392] SM-D. Book review: Practical Mal-ware Analysis, by Michael Sikorski andAndrew Honig. No Starch Press. ISBN978-1-59327-290-6. Network Security,2012(12):4, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3394] Bill Morrow. BYOD security chal-lenges: control and protect your mostsensitive data. Network Security, 2012(12):5–8, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812701113.
Sood:2012:AGP
[3395] Aditya K. Sood, Peter Greko, andRichard J. Enbody. Abusing Glypeproxies: attacks, exploits and de-fences. Network Security, 2012(12):8–15, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812701125.
Gold:2012:VJH
[3396] Steve Gold. Virtual jihad: how realis the threat? Network Security, 2012(12):15–18, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485812701137.
Malecki:2012:NGF
[3397] Florian Malecki. Next-generationfirewalls: security with perfor-mance. Network Security, 2012(12):19–20, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3399] Anonymous. CA error results in cer-tificate blunder. Network Security,2013(1):1–2, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700126.
Anonymous:2013:UBA
[3400] Anonymous. US banks attacked —but by whom? Network Security,2013(1):2, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700138.
Anonymous:2013:Ba
[3401] Anonymous. In brief. Network Secu-rity, 2013(1):3, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581370014X.
SM-D:2013:BRC
[3402] SM-D. Book review: CUDA Pro-gramming, Shane Cook. Morgan Kauf-mann. ISBN 978-0-12-415933-4. Net-work Security, 2013(1):4, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700151.
SM-D:2013:BRT
[3403] SM-D. Book review: Think Likea Programmer, V Anton Spraul.No Starch Press. ISBN 978-1-59327-424-5. Network Security, 2013(1):4, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700163.
Bradbury:2013:VSS
[3404] Danny Bradbury. Verifying softwaresecurity — is it possible? Net-work Security, 2013(1):5–7, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700175.
Kurpjuhn:2013:ERU
[3405] Thorsten Kurpjuhn. The evolvingrole of the UTM appliance. Net-work Security, 2013(1):8–11, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700187.
Hart:2013:WTA
[3406] Jason Hart. Why the traditional ap-proach to information security is nolonger working. Network Security, 2013(1):12–14, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700199.
Bhat:2013:UMS
[3407] Wasim Ahmad Bhat and S. M. K.Quadri. Understanding and mitigat-
REFERENCES 415
ing security issues in Sun NFS. Net-work Security, 2013(1):15–18, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700205.
Walker-Brown:2013:MVM
[3408] Andrew Walker-Brown. Manag-ing VPNs in the mobile worker’sworld. Network Security, 2013(1):18–20, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3410] Anonymous. Bit9 bitten by hack-ers. Network Security, 2013(2):1–2, February 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700230.
Anonymous:2013:MSC
[3411] Anonymous. Microsoft and Syman-tec cripple botnet. Network Security,2013(2):2, February 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700242.
Anonymous:2013:Bb
[3412] Anonymous. In brief. NetworkSecurity, 2013(2):3, February 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700254.
Anonymous:2013:BRL
[3413] Anonymous. Book review: Loggingand Log Management, Anton Chu-vakin, Kevin Schmidt and Christo-pher Phillips. Syngress. ISBN 978-1-59749-635-3. Network Security,2013(2):4, February 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700266.
Anonymous:2013:BRC
[3414] Anonymous. Book review: CISSPStudy Guide, Eric Conrad, SethMisenar and Joshua Feldman. Syn-gress. ISBN 978-1-59749-961-3. Net-work Security, 2013(2):4, February2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3417] Marc Meulensteen. A smart gridmust also be streetwise. Network Se-curity, 2013(2):10–12, February 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3422] Anonymous. Facebook, Apple andMicrosoft hit by Java exploit atwatering hole. Network Security,2013(3):1–2, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700357.
Anonymous:2013:URP
[3423] Anonymous. US report points fin-ger at China’s military cyberwar unit.Network Security, 2013(3):2, March2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700369.
Anonymous:2013:Bc
[3424] Anonymous. In brief. Network Secu-rity, 2013(3):3, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700370.
Anonymous:2013:BRW
[3425] Anonymous. Book review: Win-dows PowerShell 3.0 Step by Step,by Ed Wilson. Microsoft Press. ISBN978-0-7356-6339-8 (print), 978-0-7356-6337-4 (ebook). Network Security,2013(3):4, March 2013. CODEN
[3426] Dan Pitt. Trust in the cloud: therole of SDN. Network Security,2013(3):5–6, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700394.
Nachreiner:2013:BSA
[3427] Corey Nachreiner. Beat security au-ditors at their own game. Net-work Security, 2013(3):7–11, March2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700400.
Winter:2013:SVH
[3428] Robert Winter. SSD vs HDD —data recovery and destruction. Net-work Security, 2013(3):12–14, March2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700412.
Bassill:2013:HAS
[3429] Peter Bassill. The holistic approachto security. Network Security, 2013(3):14–17, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3432] Anonymous. Spamhaus DDoS at-tack fails to take down Internet.Network Security, 2013(4):1–2, April2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581370045X.
Anonymous:2013:UBCa
[3433] Anonymous. US bans Chinese technol-ogy. Network Security, 2013(4):2, April2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700461.
Anonymous:2013:Bd
[3434] Anonymous. In brief. Network Secu-rity, 2013(4):3, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700473.
REFERENCES 418
Anonymous:2013:BRI
[3435] Anonymous. Book review: In-stant Penetration Testing: SettingUp a Test Lab How-to, by Vyach-eslav Fadyushin. Packt Publishing.ISBN 1-84969-412-5. Network Secu-rity, 2013(4):4, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700485.
Walters:2013:BIS
[3436] Richard Walters. Bringing IT outof the shadows. Network Security,2013(4):5–11, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700497.
Tokuyoshi:2013:SIB
[3437] Brian Tokuyoshi. The security impli-cations of BYOD. Network Security,2013(4):12–13, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3451] Anonymous. PandaLabs says thefight against cybercrime is be-ing won. Network Security, 2013(6):1–2, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700643.
Anonymous:2013:MSB
[3452] Anonymous. McAfee says it’s busi-ness as usual. Network Security,2013(6):2, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700655.
REFERENCES 420
Anonymous:2013:Bf
[3453] Anonymous. In brief. Network Secu-rity, 2013(6):3, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700667.
Anonymous:2013:BRV
[3454] Anonymous. Book review: ViolentPython, by T. J. O’Connor. Syngress.ISBN 978-1-59749-957-6. Network Se-curity, 2013(6):4, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700679.
Barker:2013:SII
[3455] Keith Barker. The security impli-cations of IPv6. Network Security,2013(6):5–9, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700680.
Gold:2013:GLI
[3456] Steve Gold. Getting lost onthe Internet: the problem withanonymity. Network Security, 2013(6):10–13, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700692.
Brooks:2013:CEI
[3457] Tim Brooks. Classic enterprise IT:the castle approach. Network Security,2013(6):14–16, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700709.
Mansfield-Devine:2013:QCT
[3458] Steve Mansfield-Devine. Q&A:Colin Tankard — raising securityawareness. Network Security, 2013(6):16–19, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700710.
Anonymous:2013:UWI
[3459] Anonymous. US warns of increasedcyber-attacks by Iran. Network Se-curity, 2013(6):19–20, June 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700722.
Anonymous:2013:JTD
[3460] Anonymous. Journalists threatenedwith data protection laws after usingexposed information. Network Secu-rity, 2013(6):20, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700734.
Anonymous:2013:NUA
[3461] Anonymous. NATO under attack.Network Security, 2013(6):20, June2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3463] Anonymous. Web is still theweakest point. Network Security,2013(7):1–2, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3473] Anonymous. TOR attacked — possi-bly by the NSA. Network Security,2013(8):1–2, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700862.
Anonymous:2013:MIM
[3474] Anonymous. Mobile insecuritiesmultiply. Network Security, 2013(8):2, 20, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700874.
Anonymous:2013:Bh
[3475] Anonymous. In brief. Network Secu-rity, 2013(8):3, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700886.
Anonymous:2013:BRBa
[3476] Anonymous. Book review: TheBasics of Web Hacking, by Josh
Pauli. Syngress. ISBN 978-0-12-416600-4. Network Security, 2013(8):4, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700898.
Anonymous:2013:BRBb
[3477] Anonymous. Book review: TheBasics of Web Hacking, by JoshPauli. Syngress. ISBN 978-0-12-416600-4. Network Security, 2013(8):4, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700904.
Thielens:2013:WAC
[3478] John Thielens. Why APIs are centralto a BYOD security strategy. Net-work Security, 2013(8):5–6, August2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813700916.
Gaffney:2013:FFW
[3479] Tom Gaffney. Following in the foot-steps of Windows: how Android mal-ware development is looking veryfamiliar. Network Security, 2013(8):7–10, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700928.
Mansfield-Devine:2013:IME
[3480] Steve Mansfield-Devine. Inter-view: Mick Ebsworth — a matterof trust. Network Security, 2013
REFERENCES 423
(8):11–13, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581370093X.
Gold:2013:SCT
[3481] Steve Gold. Subverting cellulartechnology: evolution, not revo-lution. Network Security, 2013(8):14–19, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813700941.
Anonymous:2013:FMI
[3482] Anonymous. Firms making it easy forattackers, says KMPG. Network Secu-rity, 2013(8):20, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3487] Anonymous. Simple steps to dataencryption. Network Security, 2013(9):4, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701004.
Arean:2013:DRC
[3488] Oscar Arean. Disaster recovery inthe cloud. Network Security, 2013(9):5–7, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701016.
Kenyon:2013:RAW
[3489] Tony Kenyon. The role of ADCs withinsecure application delivery. NetworkSecurity, 2013(9):8–12, September2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813701028.
REFERENCES 424
Dunford:2013:MFT
[3490] Dan Dunford. Managed file trans-fer: the next stage for data in mo-tion? Network Security, 2013(9):12–15, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581370103X.
Hibbert:2013:CTC
[3491] Richard Hibbert. Calling timeon compliance spreadsheet over-load. Network Security, 2013(9):15–17, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701041.
Mansfield-Devine:2013:IJC
[3492] Steve Mansfield-Devine. Inter-view: Jon Callas, Silent Cir-cle. Network Security, 2013(9):17–20, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3495] Anonymous. Mobile malware topsone million, but Google says prob-lem exaggerated. Network Security,2013(10):2, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701089.
Anonymous:2013:Bj
[3496] Anonymous. In brief. NetworkSecurity, 2013(10):3, October 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485813701090.
Anonymous:2013:ICW
[3497] Anonymous. Introduction to cyber-warfare. Network Security, 2013(10):4, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701107.
Anonymous:2013:ACS
[3498] Anonymous. Applied cyber-securityand the Smart Grid. Network Security,2013(10):4, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701119.
REFERENCES 425
Small:2013:DBI
[3499] Mike Small. From data breach to infor-mation stewardship. Network Security,2013(10):5–8, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701120.
Erdheim:2013:DMN
[3500] Sam Erdheim. Deployment andmanagement with next-generationfirewalls. Network Security, 2013(10):8–12, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701132.
Chappell:2013:PMI
[3501] Brian Chappell. Privilege manage-ment — the industry’s best kept se-cret. Network Security, 2013(10):12–14, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701144.
Baker:2013:IBT
[3502] Scott Baker. IP-based technology— the future of the security in-dustry. Network Security, 2013(10):14–17, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701156.
Mansfield-Devine:2013:ISH
[3503] Steve Mansfield-Devine. Inter-view: Seth Hallem, Mobile Helix
— the right way to mobile secu-rity. Network Security, 2013(10):18–20, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3505] Anonymous. Women may be the fu-ture of infosecurity. Network Security,2013(11):1–2, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3513] EJ Hilbert. Living with cyber-crime. Network Security, 2013(11):15–17, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485813701260.
Mansfield-Devine:2013:CTD
[3514] Steve Mansfield-Devine. ColinTankard, digital pathways: confusionin the cloud. Network Security, 2013(11):17–20, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3532] Steve Watts. Protecting your iden-tity when working remotely. Net-work Security, 2014(1):5–7, January2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700054.
Shteiman:2014:WCP
[3533] Barry Shteiman. Why CMS plat-forms are breeding security vulner-abilities. Network Security, 2014(1):7–9, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700066.
Patterson:2014:INT
[3534] Mike Patterson. An index for networkthreat detection. Network Security,2014(1):9–11, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700078.
Mansfield-Devine:2014:ICN
[3535] Steve Mansfield-Devine. Interview:Corey Nachreiner, WatchGuard — se-curity visibility. Network Security, 2014(1):11–15, January 2014. CODEN
[3536] Richard Moulds. The global data pro-tection conundrum. Network Security,2014(1):16–17, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3541] Anonymous. Encryption on the rise,but not enough. Network Security,2014(2):1–2, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700145.
Anonymous:2014:DAR
[3542] Anonymous. DDoS attacks on therise — by criminals and spies. Net-work Security, 2014(2):2, February2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700157.
Anonymous:2014:Bb
[3543] Anonymous. In brief. NetworkSecurity, 2014(2):3, February 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700169.
Anonymous:2014:MSH
[3544] Anonymous. Mobile security: Howto secure, privatize and recover yourdevices. Network Security, 2014(2):4, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700170.
REFERENCES 430
Anonymous:2014:CIR
[3545] Anonymous. Computer incidentresponse and forensics team man-agement. Network Security, 2014(2):4, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700182.
Kedgley:2014:FIM
[3546] Mark Kedgley. File integrity mon-itoring in the modern threat land-scape. Network Security, 2014(2):5–8, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700194.
Heim:2014:QCD
[3547] Peter Heim. The quest for clar-ity on data protection and secu-rity. Network Security, 2014(2):8–10, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700200.
Allen:2014:MDS
[3548] Stephen Allen. Medical device soft-ware under the microscope. Net-work Security, 2014(2):11–12, February2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700212.
Zhang:2014:VCS
[3549] Hongwen Zhang. A vision for cloudsecurity. Network Security, 2014
(2):12–15, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700224.
Gold:2014:SNP
[3550] Steve Gold. In search of a newperimeter. Network Security, 2014(2):15–20, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3552] Anonymous. Threats increase on mo-bile platforms — especially Android —as popularity grows. Network Secu-rity, 2014(3):1–2, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581470025X.
Anonymous:2014:NAW
[3553] Anonymous. Nearly all web and mobileapplications have flaws. Network Secu-rity, 2014(3):2, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700261.
REFERENCES 431
Anonymous:2014:Bc
[3554] Anonymous. In brief. Network Secu-rity, 2014(3):3, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700273.
Anonymous:2014:BRPa
[3555] Anonymous. Book review: Profes-sional Penetration Testing, SecondEdition. Thomas Wilhelm. Syngress.ISBN 978-1-59749-993-4. Network Se-curity, 2014(3):4, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700285.
Caldwell:2014:CDF
[3556] Tracey Caldwell. Call the digi-tal fire brigade. Network Security,2014(3):5–8, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700297.
Barnes:2014:UDP
[3557] Pat Barnes. Using DNS to protectnetworks from threats within. Net-work Security, 2014(3):9–11, March2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700303.
vanLeeuwen:2014:BYO
[3558] Danielle van Leeuwen. Bring yourown software. Network Security, 2014(3):12–13, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700315.
Bradbury:2014:CWM
[3559] Danny Bradbury. Can we makeemail secure? Network Security,2014(3):13–16, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700327.
Malecki:2014:CNB
[3560] Florian Malecki. The cost of network-based attacks. Network Security,2014(3):17–18, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700339.
Keightley:2014:LXD
[3561] Mike Keightley. The loomingXP disaster in industrial environ-ments. Network Security, 2014(3):18–20, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3563] Anonymous. ‘Heartbleed’ flawleaves millions of websites, email
REFERENCES 432
servers and other services vulnera-ble to attack. Network Security,2014(4):1–2, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700364.
Anonymous:2014:WXN
[3564] Anonymous. Windows XP nowmore vulnerable than ever as Mi-crosoft support ends. Network Secu-rity, 2014(4):2, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700376.
Anonymous:2014:Bd
[3565] Anonymous. In brief. Network Secu-rity, 2014(4):3, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3572] Anonymous. Heartbleed bug leads toforking and funding. Network Secu-rity, 2014(5):1–2, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700455.
REFERENCES 433
Anonymous:2014:HPB
[3573] Anonymous. High-profile breaches fail-ing to make financial firms tightentheir security. Network Security,2014(5):2, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700467.
Anonymous:2014:Be
[3574] Anonymous. In brief. Network Secu-rity, 2014(5):3, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700479.
Anonymous:2014:DFP
[3575] Anonymous. Digital forensics process-ing and procedures. Network Secu-rity, 2014(5):4, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700480.
Maisey:2014:MAL
[3576] Martin Maisey. Moving to analysis-led cyber-security. Network Security,2014(5):5–12, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700492.
Southam:2014:DWI
[3577] Mark Southam. DNSSEC: What it isand why it matters. Network Security,2014(5):12–15, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700509.
Inns:2014:EAS
[3578] Jon Inns. The evolution and ap-plication of SIEM systems. Net-work Security, 2014(5):16–17, May2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700510.
Blizzard:2014:DFH
[3579] Sonia Blizzard. Don’t feed the hack-ers: how your attitude to data securitycould affect business. Network Security,2014(5):18–20, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3585] CJ Radford. Challenges and solu-tions protecting data within Ama-zon Web services. Network Secu-rity, 2014(6):5–8, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700583.
Bradbury:2014:TDB
[3586] Danny Bradbury. Testing the de-fences of bulletproof hosting com-panies. Network Security, 2014(6):8–12, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700595.
Gold:2014:CAD
[3587] Steve Gold. Challenges aheadon the digital forensics and au-dit trails. Network Security, 2014(6):12–17, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700601.
Marrison:2014:DAV
[3588] Chris Marrison. DNS as an attackvector — and how businesses cankeep it secure. Network Security,2014(6):17–20, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700613.
Anonymous:2014:GWB
[3589] Anonymous. Gartner warns of bigdata security problems. Network Secu-rity, 2014(6):20, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3595] Jean-Yves Bisiaux. DNS threats andmitigation strategies. Network Secu-rity, 2014(7):5–9, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700686.
Storey:2014:TNS
[3596] Allen Storey. There’s nothing‘smart’ about insecure connecteddevices. Network Security, 2014
(7):9–12, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700698.
Bedwell:2014:FNA
[3597] Patrick Bedwell. Finding a new ap-proach to SIEM to suit the SME en-vironment. Network Security, 2014(7):12–16, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700704.
Mansfield-Devine:2014:BS
[3598] Steve Mansfield-Devine. Buildingin security. Network Security, 2014(7):16–19, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700716.
Anonymous:2014:CET
[3599] Anonymous. Cybercrime and espi-onage are a threat to Internet it-self. Network Security, 2014(7):20, July2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3601] Anonymous. Russian gang amassesbiggest-ever haul of stolen credentials,claims security firm. Network Security,2014(8):1–2, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700741.
Anonymous:2014:LSI
[3602] Anonymous. Lack of security in Inter-net of Things devices. Network Secu-rity, 2014(8):2, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700753.
Anonymous:2014:Bh
[3603] Anonymous. In brief. Network Secu-rity, 2014(8):3, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700765.
Anonymous:2014:KLA
[3604] Anonymous. Kali Linux — assur-ing security by penetration testing.Network Security, 2014(8):4, August2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700777.
Bridge:2014:EPP
[3605] Phil Bridge. EU puts pressure on busi-nesses to erase data. Network Security,2014(8):5–8, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700789.
Tang:2014:GPT
[3606] Andrew Tang. A guide to pene-tration testing. Network Security,2014(8):8–11, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700790.
Lowe:2014:DAC
[3607] Mark Lowe. Defending againstcyber-criminals targeting businesswebsites. Network Security, 2014(8):11–13, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700807.
Mansfield-Devine:2014:CC
[3608] Steve Mansfield-Devine. Not cop-ing with change. Network Security,2014(8):14–17, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700819.
Watts:2014:ICB
[3609] Steve Watts. Intelligent combination— the benefits of tokenless two-factorauthentication. Network Security, 2014(8):17–20, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3621] Lasse Andresen. Open sourcing the fu-ture of IAM. Network Security, 2014(9):18–20, September 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3625] Anonymous. In brief. NetworkSecurity, 2014(10):3, October 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814700984.
Anonymous:2014:PNS
[3626] Anonymous. The practice of networksecurity monitoring. Network Security,2014(10):4, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814700996.
Brazil:2014:SMM
[3627] Jody Brazil. Security metrics to man-age change. Network Security, 2014(10):5–7, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581470100X.
Boldyreva:2014:MEW
[3628] Alexandra Boldyreva and Paul Grubbs.Making encryption work in thecloud. Network Security, 2014(10):8–10, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 439
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701011.
Bradbury:2014:APG
[3629] Danny Bradbury. Anonymity andprivacy: a guide for the per-plexed. Network Security, 2014(10):10–14, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701023.
Martini:2014:SAW
[3630] Paul Martini. A secure approach towearable technology. Network Secu-rity, 2014(10):15–17, October 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814701035.
Mansfield-Devine:2014:MSD
[3631] Steve Mansfield-Devine. Masking sen-sitive data. Network Security, 2014(10):17–20, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3635] Anonymous. In brief. Network Se-curity, 2014(11):3, November 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814701084.
Anonymous:2014:WFA
[3636] Anonymous. Windows forensic anal-ysis toolkit. Network Security, 2014(11):4, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701096.
Anonymous:2014:SEP
[3637] Anonymous. Social engineering pen-etration testing. Network Security,2014(11):4, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701102.
REFERENCES 440
Munro:2014:ASA
[3638] Ken Munro. Android scraping: ac-cessing personal data on mobile de-vices. Network Security, 2014(11):5–9, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701114.
Taylor:2014:FIS
[3639] Mark Taylor, John Haggerty, DavidGresty, Peter Almond, and TomBerry. Forensic investigation of so-cial networking applications. NetworkSecurity, 2014(11):9–16, November2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814701126.
Mansfield-Devine:2014:MSA
[3640] Steve Mansfield-Devine. Mobile secu-rity: it’s all about behaviour. NetworkSecurity, 2014(11):16–20, November2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3643] Anonymous. Sony suffers major databreach as attackers leak files and de-stroy hard drives. Network Security,2014(12):1–2, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701163.
Anonymous:2014:RSS
[3644] Anonymous. Is Regin the son ofStuxnet? Network Security, 2014(12):2, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701175.
Anonymous:2014:Bl
[3645] Anonymous. In brief. Network Se-curity, 2014(12):3, December 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814701187.
Anonymous:2014:HPT
[3646] Anonymous. Hacking and pene-tration testing with low power de-vices. Network Security, 2014(12):4, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701199.
REFERENCES 441
Tipping:2014:RTV
[3647] David Tipping. The rising threats fromVoice over IP. Network Security, 2014(12):5–6, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701205.
Kalra:2014:TAE
[3648] Gursev Singh Kalra. Threat anal-ysis of an enterprise messaging sys-tem. Network Security, 2014(12):7–13, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701217.
Jones:2014:TDD
[3649] Robert Jones and Tony Dearsley.Time for a data detox. NetworkSecurity, 2014(12):13–15, December2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485814701229.
Goldberg:2014:TUT
[3650] Joe Goldberg. Tackling unknownthreats. Network Security, 2014(12):16–17, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485814701230.
Lane:2014:CDS
[3651] Ashley Lane. Cross domain so-lutions — and why they mat-ter. Network Security, 2014(12):18–20, December 2014. CODEN
[3653] Anonymous. Doubts remain overwhether North Korea was responsi-ble for massive hack of Sony Pic-tures. Network Security, 2015(1):1–2, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700012.
Anonymous:2015:TUA
[3654] Anonymous. Tor under attack,again. Network Security, 2015(1):2, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700024.
Anonymous:2015:SG
[3655] Anonymous. Steve Gold — 1956–2015. Network Security, 2015(1):3, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700036.
REFERENCES 442
Anonymous:2015:Ba
[3656] Anonymous. In brief. Network Secu-rity, 2015(1):3, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700048.
Anonymous:2015:BRP
[3657] Anonymous. Book review: Penetra-tion Testing with the Bash Shell, byKeith Makan. Packt Publishing. ISBN978-1-84969-510-7. Network Security,2015(1):4, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581570005X.
Anonymous:2015:BRL
[3658] Anonymous. Book review: Learn-ing PHP, MySQL, JavaScript, CSS& HTML5, by Robin Nixon. ThirdEdition. O’Reilly. ISBN 978-1-4919-4946-7. Network Security, 2015(1):4, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700061.
Densham:2015:TCS
[3659] Ben Densham. Three cyber-securitystrategies to mitigate the impact ofa data breach. Network Security,2015(1):5–8, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700073.
Patel:2015:NPC
[3660] Ashish Patel. Network perfor-mance without compromising se-curity. Network Security, 2015(1):9–12, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700085.
Lafuente:2015:BDS
[3661] Guillermo Lafuente. The big data se-curity challenge. Network Security,2015(1):12–14, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815700097.
Mansfield-Devine:2015:MIC
[3662] Steve Mansfield-Devine. Man-aging identity for a competitiveedge. Network Security, 2015(1):14–18, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3665] Anonymous. European organisationsare still not ready for forthcoming dataprotection rules. Network Security,2015(2):1–2, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300015.
Anonymous:2015:LHA
[3666] Anonymous. Linux hit by anotherlong-term flaw. Network Security,2015(2):2, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300027.
Anonymous:2015:Bb
[3667] Anonymous. In brief. NetworkSecurity, 2015(2):3, February 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300039.
Anonymous:2015:BRK
[3668] Anonymous. Book reviewKali LinuxNetwork Scanning Cookbook, by JustinHutchens. Packt Publishing. ISBN978-1-78398-214-1. Network Security,2015(2):4, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300040.
Mansfield-Devine:2015:PD
[3669] Steve Mansfield-Devine. The privacydilemma. Network Security, 2015(2):5–10, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300052.
Nielsen:2015:ICK
[3670] Poul Nielsen. The importance ofcontext in keeping end users se-cure. Network Security, 2015(2):10–13, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300064.
Green:2015:SAC
[3671] John Green. Staying ahead of cyber-attacks. Network Security, 2015(2):13–16, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3679] Anonymous. Book review: GoogleEarth Forensics, by Michael Harring-ton and Michael Cross. Syngress. ISBN978-0-12-800216-2. Network Secu-rity, 2015(3):4, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300155.
Tankard:2015:HSY
[3680] Colin Tankard. How secure isyour building? Network Security,2015(3):5–8, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300167.
Cates:2015:ESI
[3681] Sol Cates. The evolution of secu-rity intelligence. Network Security,2015(3):8–10, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300179.
Everett:2015:SDN
[3682] Cath Everett. Should the dark netbe taken out? Network Security,2015(3):10–13, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
REFERENCES 445
//www.sciencedirect.com/science/
article/pii/S1353485815300180.
Buesnel:2015:TSN
[3683] Guy Buesnel. Threats to satellite nav-igation systems. Network Security,2015(3):14–18, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300192.
Newe:2015:DIT
[3684] Gary Newe. Delivering the Inter-net of Things. Network Security,2015(3):18–20, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3686] Anonymous. Mobile vulnerabilitiesare opening the door to cyber-attackson corporates. Network Security,2015(4):1–2, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300222.
Anonymous:2015:BAA
[3687] Anonymous. British Airways amonglatest breaches. Network Security,2015(4):2, 20, April 2015. CODEN
[3688] Anonymous. In brief. Network Secu-rity, 2015(4):3, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300246.
Anonymous:2015:BRBa
[3689] Anonymous. Book review: Black HatPython, Justin Seitz. No Starch Press.ISBN 978-1-59327-590-7. Network Se-curity, 2015(4):4, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300258.
Clay:2015:MTR
[3690] Peter Clay. A modern threat re-sponse framework. Network Security,2015(4):5–10, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581530026X.
Kedgley:2015:IYC
[3691] Mark Kedgley. If you can’tstop the breach, at least spot thebreach. Network Security, 2015(4):11–12, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300271.
REFERENCES 446
Auty:2015:AAP
[3692] Mike Auty. Anatomy of an advancedpersistent threat. Network Security,2015(4):13–16, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3694] Phil Beckett. Getting your back-updata back up to date. Network Security,2015(4):18–20, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3698] Anonymous. In brief. Network Secu-rity, 2015(5):3, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300349.
Anonymous:2015:BRBb
[3699] Anonymous. Book review: Build-ing an Information Security Aware-ness Program, Bill Gardner and Va-lerie Thomas. Syngress. ISBN 978-0-12-419967-5. Network Security,2015(5):4, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300350.
Anonymous:2015:BRGb
[3700] Anonymous. Book review: TheGNU Make Book, John Graham-Cumming. No Starch Press. ISBN978-1-59327-649-2. Network Secu-rity, 2015(5):4, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300362.
REFERENCES 447
Brewer:2015:CTR
[3701] Ross Brewer. Cyber threats: reduc-ing the time to detection and response.Network Security, 2015(5):5–8, May2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300374.
Tankard:2015:DCF
[3702] Colin Tankard. Data classifica-tion — the foundation of informa-tion security. Network Security,2015(5):8–11, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3704] Paul German. The dangers of un-secured voice. Network Security,2015(5):18–19, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3707] Anonymous. Darknet less se-cure than many think, say re-searchers. Network Security, 2015(6):1–2, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581530043X.
Anonymous:2015:LLL
[3708] Anonymous. Logjam is latestlong-term flaw. Network Security,2015(6):2, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300441.
Anonymous:2015:Bf
[3709] Anonymous. In brief. Network Secu-rity, 2015(6):3, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300453.
Anonymous:2015:BRAa
[3710] Anonymous. Book review: An-droid Security Internals, NikolayElenkov. No Starch Press. ISBN
[3711] Tim Ring. Keeping tabs on track-ing technology. Network Security,2015(6):5–8, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300477.
Hooson:2015:SYD
[3712] Stuart Hooson. Smarten your datasecurity before new EU legislation orrisk corporate loss. Network Secu-rity, 2015(6):8–10, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3714] David Hald and Alex Udakis. Rethink-ing remote authentication: time to kisstokens goodbye? Network Security,2015(6):15–17, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300507.
Huard:2015:DQP
[3715] Boris Huard. The data qualityparadox. Network Security, 2015(6):18–20, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3719] Anonymous. In brief. Network Secu-rity, 2015(7):3, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
REFERENCES 449
//www.sciencedirect.com/science/
article/pii/S1353485815300556.
Anonymous:2015:BRM
[3720] Anonymous. Book review: The MobileApplication Hacker’s Handbook, by Do-minic Chell, Tyrone Erasmus, ShaunColley, and Ollie Whitehouse Wiley.ISBN 978-1-118-95850-6. Network Se-curity, 2015(7):4, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300568.
Kingswood:2015:CCW
[3721] Matt Kingswood. Climate changewill require more agile business con-tinuity planning. Network Security,2015(7):5–10, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581530057X.
Ring:2015:CSF
[3722] Tim Ring. Cloud security fears:fact or FUD? Network Security,2015(7):10–14, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300581.
McKenna:2015:HFA
[3723] Matthew McKenna. How federalagencies can secure their cloud mi-grations. Network Security, 2015(7):14–16, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300593.
Larson:2015:ITW
[3724] Dave Larson and Stephen Gates.Is it true that what you can’t seecan’t hurt you? Network Security,2015(7):17–18, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581530060X.
Watts:2015:NDP
[3725] Steve Watts. NFC and 2FA: the deathof the password? Network Security,2015(7):19–20, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3727] Anonymous. Android stagefright vul-nerability threatens all devices —and fixing it isn’t that easy. Net-work Security, 2015(8):1–2, August2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300635.
Anonymous:2015:UPS
[3728] Anonymous. UK public sectorweak on security. Network Security,2015(8):2, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 450
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300647.
Anonymous:2015:Bh
[3729] Anonymous. In brief. Network Secu-rity, 2015(8):3, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300659.
SM-D:2015:BRH
[3730] SM-D. Book review: Hacking Web In-telligence, [by Sudhanshu Chauhan andNutan Kumar Panda. Syngress. ISBN978-0-12-801867-5]. Network Secu-rity, 2015(8):4, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300660.
SM-D:2015:BRB
[3731] SM-D. Book review: The Bookof GNS3 [by Jason Neumann. NoStarch Press. ISBN 978-1-59327-554-9]. Network Security, 2015(8):4, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300672.
Smyth:2015:CSF
[3732] Vincent Smyth. Cyber-securityfortresses built on quicksand. Net-work Security, 2015(8):5–8, August2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300684.
Simmonds:2015:DII
[3733] Paul Simmonds. The digital iden-tity issue. Network Security, 2015(8):8–13, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300696.
Richter:2015:MYD
[3734] Chris Richter. Managing your datarisk: back to basics. Network Security,2015(8):13–15, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300702.
Knights:2015:MID
[3735] Ricky Knights and Emma Mor-ris. Move to intelligence-drivensecurity. Network Security, 2015(8):15–18, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300714.
Anstee:2015:PTT
[3736] Darren Anstee. Preparing for to-morrow’s threat landscape. Net-work Security, 2015(8):18–20, August2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3738] Anonymous. DDoS attacks on the riseand being used to mask other, moresignificant breaches. Network Security,2015(9):1–2, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3740] Anonymous. In brief. Network Se-curity, 2015(9):3, September 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300763.
Anonymous:2015:BRSa
[3741] Anonymous. Book review: SecuringSQL Server, by Denny Cherry. Syn-gress. ISBN 978-0-12-801275-8. Net-work Security, 2015(9):4, September2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300775.
Anonymous:2015:BRDa
[3742] Anonymous. Book review: Dig-ital Identity Management, Mary-
line Laurent and Samia Bouzefrane.ISTE Press/Elsevier. ISBN 978-1-78548-004-1. Network Security, 2015(9):4, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300787.
Bocek:2015:HEP
[3743] Kevin Bocek. Is HTTPS enough to pro-tect governments? Network Security,2015(9):5–8, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300799.
Mansfield-Devine:2015:AMA
[3744] Steve Mansfield-Devine. The AshleyMadison affair. Network Security, 2015(9):8–16, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300805.
Kirk:2015:CFI
[3745] Richard Kirk. Cars of the future:the Internet of Things in the automo-tive industry. Network Security, 2015(9):16–18, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300817.
Rozanski:2015:UCD
[3746] Shahaf Rozanski. Using clouddata to accelerate forensic investi-gations. Network Security, 2015(9):19–20, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),
[3748] Anonymous. Healthcare organi-sations struggle to maintain se-curity. Network Security, 2015(10):1–2, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300842.
Anonymous:2015:CC
[3749] Anonymous. The cost of cyber-crime. Network Security, 2015(10):2, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300854.
Anonymous:2015:Bj
[3750] Anonymous. In brief. NetworkSecurity, 2015(10):3, October 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300866.
Anonymous:2015:BRSb
[3751] Anonymous. Book review: Suc-cess Strategies from Women inSTEM, Edited by Peggy A Pritchard
and Christine Grant. Second edi-tion. Academic Press. ISBN 978-0-12-397181-4. Network Security,2015(10):4, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300878.
Anonymous:2015:BRDb
[3752] Anonymous. Book review: Do-ing Math With Python, Amit Saha.No Starch Press. ISBN 978-1-59327-640-9. Network Security, 2015(10):4, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581530088X.
Hof:2015:AND
[3753] Jan Hof. Addressing new demands onnetwork security. Network Security,2015(10):5–7, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300891.
Marrison:2015:UTD
[3754] Chris Marrison. Understanding thethreats to DNS and how to se-cure it. Network Security, 2015(10):8–10, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
11–13, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581530091X.
Mansfield-Devine:2015:GED
[3756] Steve Mansfield-Devine. The growthand evolution of DDoS. Network Se-curity, 2015(10):13–20, October 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3758] Anonymous. UK Government bat-tles tech firms over encryption. Net-work Security, 2015(11):1–2, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300945.
Anonymous:2015:RDN
[3759] Anonymous. Ransomware defeated butnew forms emerge. Network Security,2015(11):2, November 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300957.
Anonymous:2015:Bk
[3760] Anonymous. In brief. Network Se-curity, 2015(11):3, November 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300969.
Anonymous:2015:BRH
[3761] Anonymous. Book review: How Soft-ware Works, by V Anton Spraul.No Starch Press. ISBN 978-1-59327-666-9. Network Security, 2015(11):4, November 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300970.
Mansfield-Devine:2015:WAT
[3762] Steve Mansfield-Devine. When adver-tising turns nasty. Network Security,2015(11):5–8, November 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815300982.
German:2015:CSC
[3763] Paul German. Counting the secu-rity cost of cheap calls. NetworkSecurity, 2015(11):9–11, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815300994.
Ring:2015:CCN
[3764] Tim Ring. Connected cars — thenext target for hackers. NetworkSecurity, 2015(11):11–16, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 454
URL http://www.sciencedirect.
com/science/article/pii/S1353485815301008.
Beckett:2015:BRU
[3765] Phil Beckett. The business risks ofusing smartphones. Network Secu-rity, 2015(11):16–17, November 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3768] Anonymous. A fifth of UK con-sumers are victims of theft via databreaches. Network Security, 2015(12):1–2, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815301045.
Anonymous:2015:FFW
[3769] Anonymous. Four out of five web appsfail key tests. Network Security, 2015(12):2, 20, December 2015. CODEN
[3770] Anonymous. In brief. Network Se-curity, 2015(12):3, December 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485815301069.
Anonymous:2015:BRC
[3771] Anonymous. Book review: Cocoa Pro-gramming for OS X, by Aaron Hille-gass, Adam Preble and Nate Chandler.Fifth edition. Big Nerd Ranch. ISBN978-0-13-407695-9. Network Security,2015(12):4, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815301070.
Anonymous:2015:BRAb
[3772] Anonymous. Book review: An-droid Programming, by Bill Phillips,Chris Stewart, Brian Hardy &Kristin Marsicano. Second edition,Big Nerd Ranch. ISBN 978-0-13-417145-6. Network Security, 2015(12):4, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815301082.
Kirk:2015:TSN
[3773] Richard Kirk. Threat sharing —a neighbourhood watch for securitypractitioners. Network Security, 2015(12):5–7, December 2015. CODEN
[3774] Tracey Caldwell. Taking agile develop-ment beyond software — what are thesecurity risks? Network Security, 2015(12):8–11, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815301100.
Adato:2015:NOP
[3775] Leon Adato. Network outages — pickyour battles. Network Security, 2015(12):12–13, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815301112.
Mansfield-Devine:2015:UR
[3776] Steve Mansfield-Devine. Under theradar. Network Security, 2015(12):14–18, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815301124.
Watts:2015:HGA
[3777] Steve Watts. The holy grail of au-thentication. Network Security, 2015(12):18–19, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485815301136.
Anonymous:2015:WRD
[3778] Anonymous. Wide range of devices vul-nerable to hacking. Network Security,2015(12):20, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3780] Anonymous. Juniper firewalls con-tain deliberate weakness that pro-vides back door. Network Security,2016(1):1–2, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300010.
Anonymous:2016:MBE
[3781] Anonymous. More battles over encryp-tion & surveillance. Network Secu-rity, 2016(1):2, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300022.
Anonymous:2016:Ba
[3782] Anonymous. In brief. Network Secu-rity, 2016(1):3, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300034.
REFERENCES 456
Anonymous:2016:BRH
[3783] Anonymous. Book review: Howto Attack and Defend Your Website,by Henry Dalziel. Syngress. ISBN978-0-12-802754-7. Network Security,2016(1):4, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300046.
Anonymous:2016:BRS
[3784] Anonymous. Book review: Secur-ing Social Media in the Enterprise,by Henry Dalziel. Syngress. ISBN978-0-12-804180-2. Network Security,2016(1):4, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300058.
Shaulov:2016:BMS
[3785] Michael Shaulov. Bridging mobilesecurity gaps. Network Security,2016(1):5–8, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581630006X.
Fimin:2016:BBA
[3786] Michael Fimin. Breaking bad:avoiding the 10 worst IT adminhabits. Network Security, 2016(1):8–11, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300071.
Touchette:2016:EM
[3787] Fred Touchette. The evolution ofmalware. Network Security, 2016(1):11–14, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300083.
Wilkinson:2016:CDI
[3788] William Wilkinson. Cyber discoveryin investigations. Network Security,2016(1):15–17, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300095.
King:2016:KCS
[3789] Jason King and Dan Evans. Key cri-teria for selecting a secure cloud wire-less net work. Network Security, 2016(1):17–20, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3801] Anonymous. Ransomware expands,attacks hospitals and local author-ities, and moves to new plat-forms. Network Security, 2016(3):1–2, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300228.
Anonymous:2016:Bc
[3802] Anonymous. In brief. Network Secu-rity, 2016(3):3, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581630023X.
SM-D:2016:BRA
[3803] SM-D. Book review: Automating OpenSource Intelligence [edited by RobertLayton and Paul Watters, Syngress.ISBN 978-0-12-802916-9]. Network Se-curity, 2016(3):4, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300241.
SM-D:2016:BRI
[3804] SM-D. Book review: Infosec Man-agement Fundamentals, Henry Dalziel[Syngress. ISBN 978-0-12-804172-7].Network Security, 2016(3):4, March2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300253.
Larson:2016:DDS
[3805] Dave Larson. Distributed denialof service attacks — holding backthe flood. Network Security, 2016(3):5–7, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300265.
Gross:2016:DDB
[3806] Garrett Gross. Detecting and de-stroying botnets. Network Security,2016(3):7–10, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300277.
Haughey:2016:ANF
[3807] Hamish Haughey, Gregory Epiphan-iou, and Haider M. Al-Khateeb.Anonymity networks and the fragilecyber ecosystem. Network Security,2016(3):10–18, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300289.
German:2016:NMN
[3808] Paul German. A new month, anew data breach. Network Security,2016(3):18–20, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300290.
Anonymous:2016:ECc
[3809] Anonymous. Events calendar. Net-work Security, 2016(3):20, March
[3810] Anonymous. Hospitals become majortarget for ransomware. Network Secu-rity, 2016(4):1–2, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300319.
Anonymous:2016:CAF
[3811] Anonymous. Car alarm at the FBI.Network Security, 2016(4):2, April2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300320.
Anonymous:2016:Bd
[3812] Anonymous. In brief. Network Secu-rity, 2016(4):3, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300332.
Anonymous:2016:BRCa
[3813] Anonymous. Book review: TheCar Hacker’s Handbook, by CraigSmith. No Starch Press. ISBN 978-1-59327-703-1. Network Security,2016(4):4, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300344.
Anonymous:2016:BRN
[3814] Anonymous. Book review: Next Gen-eration Red Teaming, by Henry Dalziel.Syngress. ISBN 978-0-12-804171-0.Network Security, 2016(4):4, April2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300356.
Furnell:2016:VMP
[3815] Steve Furnell. Vulnerability man-agement: not a patch on wherewe should be? Network Security,2016(4):5–9, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300368.
Harwood:2016:LPG
[3816] Will Harwood. Locking up pass-words — for good. Network Security,2016(4):10–13, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581630037X.
Mansfield-Devine:2016:YLY
[3817] Steve Mansfield-Devine. Your life inyour hands: the security issues withhealthcare apps. Network Security,2016(4):14–18, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3820] Anonymous. UK Government saystwo-thirds of firms under attack.Network Security, 2016(5):1–2, May2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3822] Anonymous. In brief. Network Secu-rity, 2016(5):3, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300435.
Anonymous:2016:BRA
[3823] Anonymous. Book review: Auto-mated Security Analysis of Android
and iOS Applications with Mobile Se-curity Framework, by Henry Dalzieland Ajin Abraham. Syngress. ISBN978-0-12-805105-4. Network Secu-rity, 2016(5):4, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300447.
Anonymous:2016:BRCb
[3824] Anonymous. Book review: CISSPStudy Guide, by Eric Conrad, Seth Mis-enar and Joshua Feldman. Third edi-tion. Syngress. ISBN 978-0-12-802437-9. Network Security, 2016(5):4, May2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300459.
Grimm:2016:PCU
[3825] John Grimm. PKI: crumbling un-der the pressure. Network Security,2016(5):5–7, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300460.
Taylor:2016:AMS
[3826] Mark Taylor, John Haggerty, DavidGresty, Chris Wren, and Tom Berry.Avoiding the misuse of social me-dia by employees. Network Security,2016(5):8–11, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300472.
REFERENCES 461
Pittenger:2016:KYO
[3827] Mike Pittenger. Know your opensource code. Network Security, 2016(5):11–15, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300484.
Mansfield-Devine:2016:CSO
[3828] Steve Mansfield-Devine. Creat-ing security operations centres thatwork. Network Security, 2016(5):15–18, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3831] Anonymous. Millions of user cre-dentials for popular sites sold ondark markets. Network Security,2016(6):1–2, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300526.
Anonymous:2016:Bf
[3832] Anonymous. In brief. Network Secu-rity, 2016(6):3, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300538.
Anonymous:2016:BRMa
[3833] Anonymous. Book review: MobileData Loss: Threats and Countermea-sures, by Michael Raggo. Syngress.ISBN 978-0-12-802864-3. Network Se-curity, 2016(6):4, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581630054X.
Anonymous:2016:BRT
[3834] Anonymous. Book review: Traf-fic Anomaly Detection, by An-tonio Cuadra-Sanchez and JavierAracil. Iste Press. ISBN 978-1-78548-012-6. Network Security,2016(6):4, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300551.
Tankard:2016:WGM
[3835] Colin Tankard. What the GDPRmeans for businesses. Network Secu-rity, 2016(6):5–8, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300563.
REFERENCES 462
Hall:2016:WPK
[3836] Mark Hall. Why people are keyto cyber-security. Network Security,2016(6):9–10, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300575.
Mansfield-Devine:2016:BP
[3837] Steve Mansfield-Devine. The bat-tle for privacy. Network Security,2016(6):11–15, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300587.
Dixit:2016:HFB
[3838] Sameer Dixit. Holding the fort:a business case for testing se-curity. Network Security, 2016(6):16–18, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300599.
German:2016:SSF
[3839] Paul German. The SIP securityfallacy. Network Security, 2016(6):18–20, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3841] Anonymous. Authorities losing thebattle against cybercrime, says UK Na-tional Crime Agency. Network Secu-rity, 2016(7):1–2, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300629.
Anonymous:2016:PBT
[3842] Anonymous. Police breached thou-sands of times. Network Secu-rity, 2016(7):2, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300630.
Anonymous:2016:Bg
[3843] Anonymous. In brief. Network Secu-rity, 2016(7):3, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300642.
Anonymous:2016:BRMb
[3844] Anonymous. Book review: MalwareDiffusion Models for Modern ComplexNetworks, by Vasileios Karyotis andM. H. R. Khouzani. Morgan Kaufman.ISBN 978-0-12-802714-1. Network Se-curity, 2016(7):4, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300654.
REFERENCES 463
Anonymous:2016:BRE
[3845] Anonymous. Book review: EssentialSkills for Hackers, by Kevin Card-well, Henry Dalziel. Syngress. ISBN978-0-12-804755-2. Network Secu-rity, 2016(7):4, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300666.
Murphy:2016:NPH
[3846] Malcolm Murphy. No place tohide as DNS comes under attack.Network Security, 2016(7):5–7, July2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300678.
Hack:2016:IAB
[3847] Michael Hack. The implications ofApple’s battle with the FBI. Net-work Security, 2016(7):8–10, July2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581630068X.
Bush:2016:HDB
[3848] Don Bush. How data breacheslead to fraud. Network Security,2016(7):11–13, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300691.
Mansfield-Devine:2016:SSM
[3849] Steve Mansfield-Devine. Secur-ing small and medium-size busi-nesses. Network Security, 2016
(7):14–20, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3851] Anonymous. Ransomware menacegrows as new threats emerge. Net-work Security, 2016(8):1–2, August2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300721.
Anonymous:2016:Bh
[3852] Anonymous. In brief. Network Secu-rity, 2016(8):3, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300733.
Anonymous:2016:BRBa
[3853] Anonymous. Book review: Bit-coin and Cryptocurrency Technolo-gies, Arvind Narayanan, Joseph Bon-neau, Edward Felten, Andrew Millerand Steven Goldfeder. Network Secu-rity, 2016(8):4, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300745.
REFERENCES 464
Eddolls:2016:MCP
[3854] Matt Eddolls. Making cyber-crime prevention the highest pri-ority. Network Security, 2016(8):5–8, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300757.
German:2016:FFY
[3855] Paul German. Face the facts — yourorganisation will be breached. Net-work Security, 2016(8):9–10, August2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300769.
Rafferty:2016:DSG
[3856] Ben Rafferty. Dangerous skillsgap leaves organisations vulnera-ble. Network Security, 2016(8):11–13, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300770.
Everett:2016:SES
[3857] Cath Everett. Should encryption soft-ware be banned? Network Security,2016(8):14–17, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300782.
Hughes:2016:SRN
[3858] Duncan Hughes. Silent risk: new incar-nations of longstanding threats. Net-work Security, 2016(8):17–20, August
[3860] Anonymous. US and UK govern-ment agencies criticised over secu-rity. Network Security, 2016(9):1–2, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300812.
Anonymous:2016:TTF
[3861] Anonymous. Two-thirds of firms maybreak data laws. Network Security,2016(9):2, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300824.
Anonymous:2016:Bi
[3862] Anonymous. In brief. Network Se-curity, 2016(9):3, September 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300836.
Anonymous:2016:BRBb
[3863] Anonymous. Book review: TheBook of R, by Tilman Davies. No
REFERENCES 465
Starch Press. ISBN 978-1-59327-651-5. Network Security, 2016(9):4, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300848.
Anonymous:2016:BRCc
[3864] Anonymous. Book review: CyberGuerilla, by Jelle van Haaster, RickeyGevers and Martijn Sprengers. Syn-gress. ISBN 978-0-12-805197-9. Net-work Security, 2016(9):4, September2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581630085X.
Brewer:2016:RAD
[3865] Ross Brewer. Ransomware at-tacks: detection, prevention andcure. Network Security, 2016(9):5–9, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300861.
Sollars:2016:RBS
[3866] Marc Sollars. Risk-based security: staffcan play the defining role in secur-ing assets. Network Security, 2016(9):9–12, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300873.
Crawley:2016:HH
[3867] Adrian Crawley. Hiring hack-ers. Network Security, 2016(9):13–15, September 2016. CODEN
[3868] Phil Burdette. Timeline of an at-tack. Network Security, 2016(9):16–17, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300897.
Zhang:2016:HDS
[3869] Hongwen Zhang. How to dis-infect and secure the Internet ofThings. Network Security, 2016(9):18–20, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3871] Anonymous. US officially accuses Rus-sia of DNC hack while election systemscome under attack. Network Security,2016(10):1–2, October 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300927.
REFERENCES 466
Anonymous:2016:Bj
[3872] Anonymous. In brief. NetworkSecurity, 2016(10):3, October 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816300939.
Anonymous:2016:BRDa
[3873] Anonymous. Book review: DataBreach Preparation and Response, byKevvie Fowler. Syngress. ISBN 978-0-12-803451-4. Network Security,2016(10):4, October 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816300940.
Buratowski:2016:DSB
[3874] Michael Buratowski. The DNC serverbreach: who did it and what doesit mean? Network Security, 2016(10):5–7, October 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3879] Anonymous. UK Government launchesnew £1.9bn cyber-security strat-egy. Network Security, 2016(11):1–2, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301003.
Anonymous:2016:Bk
[3880] Anonymous. In brief. Network Se-curity, 2016(11):3, November 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816301015.
Anonymous:2016:BRDb
[3881] Anonymous. Book review: DNSSecurity, by Allan Liska and Geof-
REFERENCES 467
frey Stowe. Syngress. ISBN 978-0-12-803306-7. Network Security, 2016(11):4, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301027.
Fenton:2016:REC
[3882] Mike Fenton. Restoring execu-tive confidence: Red Team oper-ations. Network Security, 2016(11):5–7, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301039.
Mansfield-Devine:2016:DGM
[3883] Steve Mansfield-Devine. DDoSgoes mainstream: how headline-grabbing attacks could make thisthreat an organisation’s biggest night-mare. Network Security, 2016(11):7–13, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301040.
Snyder:2016:PHT
[3884] Patrick Snyder and Alien Vault. Play-ing hackers at their own game. NetworkSecurity, 2016(11):14–16, November2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816301052.
Higgins:2016:AAL
[3885] David Higgins. Anatomy of an at-tack: ‘lights out’ in Ukraine. NetworkSecurity, 2016(11):17–19, November
[3887] Karen Renaud. No, users are notirrational. Network Security, 2016(11):20, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301088.
Anonymous:2016:MIT
[3888] Anonymous. Major ISPs targetedin Internet of Things botnet at-tacks. Network Security, 2016(12):1–2, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3890] Anonymous. In brief. Network Se-curity, 2016(12):3, December 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816301118.
Anonymous:2016:BRU
[3891] Anonymous. Book review: Under-standing ECMAScript 6, by NicholasC Zakas. No Starch Press. ISBN 978-1-59327-757-4. Network Security, 2016(12):4, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581630112X.
Anonymous:2016:BRW
[3892] Anonymous. Book review: WickedCool Shell Scripts, by Dave Tay-lor and Brandon Perry. Second edi-tion. No Starch Press. ISBN 978-1-59327-602-7. Network Security, 2016(12):4, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301131.
Pittenger:2016:ASC
[3893] Mike Pittenger. Addressing the se-curity challenges of using contain-ers. Network Security, 2016(12):5–8, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301143.
Dixit:2016:OVR
[3894] Sameer Dixit. Opportunity vs riskwith the Internet of Things. NetworkSecurity, 2016(12):8–10, December2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485816301155.
Mansfield-Devine:2016:DCK
[3895] Steve Mansfield-Devine. Data classi-fication: keeping track of your mostprecious asset. Network Security, 2016(12):10–15, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301167.
Wagner:2016:HTA
[3896] Mathias Wagner. The hard truth abouthardware in cyber-security: it’s moreimportant. Network Security, 2016(12):16–19, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485816301179.
Tankard:2016:DW
[3897] Colin Tankard. The danger within.Network Security, 2016(12):20, De-cember 2016. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
[3899] Anonymous. Ransomware becomesmost popular form of attack as pay-outs approach $1bn a year. Net-work Security, 2017(1):1–2, January2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300016.
Anonymous:2017:Ba
[3900] Anonymous. In brief. Network Secu-rity, 2017(1):3, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300028.
Anonymous:2017:BRUa
[3901] Anonymous. Book review: Un-derstanding Social Engineering-BasedScams, edited by Markus Jakob-sson. Springer. ISBN 978-1-4939-6455-0. Network Security, 2017(1):4, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581730003X.
Graves:2017:DFM
[3902] Jamie Graves. Data flow manage-ment: why and how. Network Security,2017(1):5–6, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300041.
Mansfield-Devine:2017:OSS
[3903] Steve Mansfield-Devine. Open sourcesoftware: determining the real riskposed by vulnerabilities. Network Se-curity, 2017(1):7–12, January 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300053.
Wood:2017:HMS
[3904] Michael Wood. How to make SD-WAN secure. Network Security, 2017(1):12–14, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300065.
German:2017:YSB
[3905] Paul German. Is your session bor-der controller providing a false senseof security? Network Security, 2017(1):14–16, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300077.
Welch:2017:EWS
[3906] Bill Welch. Exploiting the weak-nesses of SS7. Network Security, 2017(1):17–19, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3909] Anonymous. Ransomware becomesthe most prevalent form of mal-ware and hits an ever-wider rangeof victims. Network Security, 2017(2):1–2, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300119.
Anonymous:2017:Bb
[3910] Anonymous. In brief. NetworkSecurity, 2017(2):3, February 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300120.
Anonymous:2017:BRUb
[3911] Anonymous. Book review: Un-derstanding the Digital World, byBrian Kernighan. Princeton Univer-sity Press. ISBN 978-0-691-17654-3.Network Security, 2017(2):4, February2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300132.
Lilly:2017:ICH
[3912] Andy Lilly. IMSI catchers: hack-ing mobile communications. Net-work Security, 2017(2):5–7, February2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300144.
Bedell-Pearce:2017:WBD
[3913] Jack Bedell-Pearce. When big dataand Brexit collide. Network Security,2017(2):8–9, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300156.
Graves:2017:WIP
[3914] Jamie Graves. What is intellec-tual property and how do you pro-tect it? Network Security, 2017(2):9–11, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300168.
Schenk:2017:RMF
[3915] Gert-Jan Schenk. Retailers must fo-cus on the growing cyberthreat land-scape. Network Security, 2017(2):12–13, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581730017X.
Mansfield-Devine:2017:PDS
[3916] Steve Mansfield-Devine. A processof defence — securing industrial con-trol systems. Network Security, 2017
REFERENCES 471
(2):14–19, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300181.
Erridge:2017:ORM
[3917] Tim Erridge. Optimising risk man-agement. Network Security, 2017(2):20, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3919] Anonymous. Financial institu-tions become more confident aboutcyber-security but weaknesses re-main. Network Security, 2017(3):1–2, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300211.
Anonymous:2017:ZDL
[3920] Anonymous. Zero-days last for years.Network Security, 2017(3):2, March2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300223.
Anonymous:2017:Bc
[3921] Anonymous. In brief. Network Secu-rity, 2017(3):3, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300235.
Anonymous:2017:BRM
[3922] Anonymous. Book review: TheMathematics of Secrets, by JoshuaHolden. Princeton University Press.ISBN 978-0-691-14175-6. Network Se-curity, 2017(3):4, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300247.
Tankard:2017:ECB
[3923] Colin Tankard. Encryption asthe cornerstone of big data se-curity. Network Security, 2017(3):5–7, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300259.
Henderson:2017:NIN
[3924] Lewis Henderson. National infras-tructure — the next step for sea-soned hackers. Network Security,2017(3):8–10, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300260.
Smyth:2017:SVM
[3925] Vincent Smyth. Software vulnerabil-ity management: how intelligence helps
REFERENCES 472
reduce the risk. Network Security,2017(3):10–12, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300272.
Hawkins:2017:WCV
[3926] Nick Hawkins. Why communi-cation is vital during a cyber-attack. Network Security, 2017(3):12–14, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300284.
Ring:2017:RCS
[3927] Tim Ring. The Russians are com-ing! Are security firms over-hypingthe hacker threat? Network Security,2017(3):15–18, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300296.
Green:2017:RG
[3928] Andy Green. Ransomware and theGDPR. Network Security, 2017(3):18–19, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300302.
Tankard:2017:FEC
[3929] Colin Tankard. The firewall: The eS-ignature comes of age. Network Secu-rity, 2017(3):20, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3931] Anonymous. The Russian connection:new attacks and arrests. Network Secu-rity, 2017(4):1–2, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300338.
Anonymous:2017:Bd
[3932] Anonymous. In brief. Network Secu-rity, 2017(4):3, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581730034X.
SM-D:2017:BRH
[3933] SM-D. Book review: Hiding Be-hind the Keyboard, by Brett Shaversand John Bair, Syngress. ISBN 978-0-12-803340-1. Network Security,2017(4):4, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300351.
Adato:2017:MAE
[3934] Leon Adato. Monitoring and au-tomation: it’s easier than youthink. Network Security, 2017
REFERENCES 473
(4):5–7, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300363.
Mansfield-Devine:2017:FAC
[3935] Steve Mansfield-Devine. Fileless at-tacks: compromising targets with-out malware. Network Security,2017(4):7–11, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300375.
Zeichick:2017:EIO
[3936] Alan Zeichick. Enabling inno-vation by opening up the net-work. Network Security, 2017(4):12–14, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300387.
Talwar:2017:AIN
[3937] Rohit Talwar and April Koury. Ar-tificial intelligence — the next fron-tier in IT security? Network Security,2017(4):14–17, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300399.
Hickman:2017:TI
[3938] Mark Hickman. The threat frominside. Network Security, 2017(4):18–19, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300405.
Renaud:2017:FDC
[3939] Karen Renaud. Facts do notchange minds. Network Security,2017(4):20, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3943] Anonymous. In brief. Network Secu-rity, 2017(5):3, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 474
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300454.
SM-D:2017:BRP
[3944] SM-D. Book review: Practical PacketAnalysis, Chris Sanders. Network Se-curity, 2017(5):4, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300466.
SM-D:2017:BRW
[3945] SM-D. Book review: We KnowAll About You, Rhodri Jeffreys-Jones.Network Security, 2017(5):4, May2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300478.
Newman:2017:SPG
[3946] Sean Newman. Service providers:the gatekeepers of Internet security.Network Security, 2017(5):5–7, May2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S135348581730048X.
Gajek:2017:MMD
[3947] Jacob Gajek. Macro malware:dissecting a malicious Word doc-ument. Network Security, 2017(5):8–13, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300491.
Mansfield-Devine:2017:THA
[3948] Steve Mansfield-Devine. Threat hunt-ing: assuming the worst to strengthenresilience. Network Security, 2017(5):13–17, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300508.
Farral:2017:API
[3949] Travis Farral. The attribution prob-lem with information security at-tacks. Network Security, 2017(5):17–19, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3954] Anonymous. In brief. Network Secu-rity, 2017(6):3, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300569.
Anonymous:2017:BRPa
[3955] Anonymous. Book review: Prac-tical Forensic Imaging, by BruceNikkel. No Starch Press. ISBN 978-1-59327-793-2. Network Security,2017(6):4, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300570.
Anonymous:2017:BRPb
[3956] Anonymous. Book review: ThePlot to Hack America, by MalcolmNance. Skyhorse Publishing. ISBN978-1-5107-2332-0. Network Secu-rity, 2017(6):4, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300582.
Shugrue:2017:FAT
[3957] Daniel Shugrue. Fighting ap-plication threats with cloud-basedWAFs. Network Security, 2017(6):5–8, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300594.
Zerlang:2017:GMC
[3958] Jesper Zerlang. GDPR: a mile-stone in convergence for cyber-securityand compliance. Network Security,2017(6):8–11, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300600.
Botelho:2017:HAD
[3959] Jay Botelho. How automatingdata collection can improve cyber-security. Network Security, 2017(6):11–13, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300612.
Mansfield-Devine:2017:LRK
[3960] Steve Mansfield-Devine. Leaks andransoms — the key threats to health-care organisations. Network Security,2017(6):14–19, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300624.
Tankard:2017:SE
[3961] Colin Tankard. Securing emails.Network Security, 2017(6):20, June
[3967] Simon Parkinson. Use of access con-trol to minimise ransomware impact.Network Security, 2017(7):5–8, July2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300697.
Wood:2017:TRS
[3968] Michael Wood. Top requirementson the SD-WAN security checklist.Network Security, 2017(7):9–11, July2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300703.
Taylor:2017:ACM
[3969] Mark Taylor, Denis Reilly, and BrettLempereur. An access control man-agement protocol for Internet ofThings devices. Network Security,2017(7):11–17, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300715.
Murphy:2017:ITT
[3970] Malcolm Murphy. The Internetof Things and the threat it posesto DNS. Network Security, 2017(7):17–19, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300727.
REFERENCES 477
Renaud:2017:IMY
[3971] Karen Renaud. It makes youWanna Cry. Network Security,2017(7):20, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[3973] Anonymous. Two illicit dark webmarketplaces taken down. Net-work Security, 2017(8):1–2, August2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300752.
Anonymous:2017:IBH
[3974] Anonymous. Italian bank hit withmajor breach. Network Security,2017(8):2, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300764.
Anonymous:2017:Bh
[3975] Anonymous. In brief. Network Secu-rity, 2017(8):3, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300776.
Anonymous:2017:BRT
[3976] Anonymous. Book review: ThreatForecasting, by John Pirc, DavidDeSanto, Iain Davison, and WillGragido. Syngress. ISBN 978-0-12-800006-9. Network Security, 2017(8):4, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300788.
Anonymous:2017:BRI
[3977] Anonymous. Book review: Inter-cept: The Secret History of Computersand Spies [by Gordon Corera, Weiden-feld and Nicolson, London, UK 2015,ISBN 1-78022-784-1]. Network Secu-rity, 2017(8):4, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581730079X.
Luszcz:2017:HMD
[3978] Jeff Luszcz. How maverick develop-ers can create risk in the software andIoT supply chain. Network Security,2017(8):5–7, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300806.
Haggerty:2017:HDT
[3979] Eileen Haggerty. Healthcare and digi-tal transformation. Network Security,2017(8):7–11, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300818.
REFERENCES 478
Major:2017:WTI
[3980] Tom Major. Weaponising threat in-telligence data. Network Security,2017(8):11–13, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581730082X.
German:2017:TBD
[3981] Paul German. Time to bury ded-icated hardware-based security so-lutions. Network Security, 2017(8):13–15, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300831.
Mansfield-Devine:2017:ADP
[3982] Steve Mansfield-Devine. Adapt-ing to the disappearing perime-ter. Network Security, 2017(8):15–19, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300843.
Erridge:2017:GWH
[3983] Tim Erridge. Good will hunting.Network Security, 2017(8):20, August2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[3985] Anonymous. State-backed hack-ers target US and European en-ergy sectors. Network Security, 2017(9):1–2, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301071.
Anonymous:2017:RIA
[3986] Anonymous. Ransomware and IoTamong leading threats. Network Se-curity, 2017(9):2, September 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817301083.
Anonymous:2017:Bi
[3987] Anonymous. In brief. Network Se-curity, 2017(9):3, September 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817301095.
Anonymous:2017:BRD
[3988] Anonymous. Book review: Deceptionin the Digital Age, by Cameron Ma-lin, Terry Gudaitis, Thomas Holt, andMax Kilger. Academic Press. ISBN978-0-12-411630-6. Network Security,2017(9):4, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301101.
REFERENCES 479
Farral:2017:NSA
[3989] Travis Farral. Nation-state attacks:practical defences against advancedadversaries. Network Security, 2017(9):5–7, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301113.
Condra:2017:ANS
[3990] Jon Condra. Assessing nation statethreats. Network Security, 2017(9):8–10, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301125.
Vincent:2017:SSH
[3991] Adam Vincent. State-sponsoredhackers: the new normal for busi-ness. Network Security, 2017(9):10–12, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301137.
Robinson:2017:DDG
[3992] Nick Robinson and Keith Martin.Distributed denial of government:the Estonian Data Embassy Initia-tive. Network Security, 2017(9):13–16, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301149.
Beckett:2017:DIN
[3993] Phil Beckett. Data and IP are the newnuclear: facing up to state-sponsored
[3994] Colin Tankard. Who are the at-tackers? Network Security, 2017(9):20, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4007] Anonymous. In brief. Network Se-curity, 2017(11):3, November 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300892.
Anonymous:2017:BRCb
[4008] Anonymous. Book review: Com-puter and Information Security Hand-book, Third edition, edited by JohnR Vacca. Morgan Kaufmann. ISBN978-0-12-803843-7. Network Security,2017(11):4, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300909.
Anonymous:2017:BRB
[4009] Anonymous. Book review: Big Data:a very short introduction, by Dawn E.Holmes. Oxford University Press. ISBN978-0-19-877957-5. Network Security,2017(11):4, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817300910.
Steffen:2017:SJB
[4010] Chris Steffen. Should jump box serversbe consigned to history? Net-work Security, 2017(11):5–6, November2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817300922.
Thompson:2017:PSH
[4011] Nick Thompson. Putting secu-rity at the heart of app devel-
[4016] Anonymous. NHS to create a£20m SOC and pen-testing opera-tion. Network Security, 2017(12):1–2, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301186.
Anonymous:2017:UGA
[4017] Anonymous. UK Government an-nounces interim strategy. NetworkSecurity, 2017(12):2, December 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817301198.
Anonymous:2017:B
[4018] Anonymous. In brief. Network Se-curity, 2017(12):3, December 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817301204.
Anonymous:2017:SWA
[4019] Anonymous. Safety of Web ap-plications. Network Security, 2017(12):4, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301216.
Furnell:2017:SEA
[4020] Steven Furnell and Ismini Vasileiou. Se-curity education and awareness: justlet them burn? Network Security,2017(12):5–9, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485817301228.
Lauria:2017:HFR
[4021] Filippo Lauria. How to footprint, re-port and remotely secure compromisedIoT devices. Network Security, 2017(12):10–16, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581730123X.
Mansfield-Devine:2017:RRH
[4022] Steve Mansfield-Devine. The right re-sponse: how organisations should re-act to security incidents. NetworkSecurity, 2017(12):16–19, December2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485817301241.
Erridge:2017:FT
[4023] Tim Erridge. A framework forthreats. Network Security, 2017(12):20, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4031] Dave Nicholson. Blurring the bound-aries between networking and ITsecurity. Network Security, 2018(1):11–13, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300072.
Farha:2018:MRA
[4032] Fadi Farha and Hongsong Chen. Mit-igating replay attacks with ZigBeesolutions. Network Security, 2018(1):13–19, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300084.
Tankard:2018:TPP
[4033] Colin Tankard. Tackling push pay-ment scams. Network Security, 2018(1):20, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4036] Anonymous. In brief. NetworkSecurity, 2018(2):3, February 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300126.
Anonymous:2018:STM
[4037] Anonymous. Seeking the truth frommobile evidence. Network Security,2018(2):4, February 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300138.
Wickes:2018:COD
[4038] James Wickes. CCTV: an open doorinto enterprise and national infras-tructure. Network Security, 2018(2):5–8, February 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581830014X.
Al-Azzam:2018:SRC
[4039] Saad Al-Azzam, Ahmad Sharieh, Az-zam Sleit, and Nedaa Al-Azzam. Se-curing robot communication usingpacket encryption distribution. Net-work Security, 2018(2):8–14, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300151.
Mansfield-Devine:2018:OSI
[4040] Steve Mansfield-Devine. Open sourceand the Internet of Things. Net-work Security, 2018(2):14–19, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300163.
Renaud:2018:GTC
[4041] Karen Renaud and Lynsay Shepherd.GDPR: its time has come. Net-work Security, 2018(2):20, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[4044] Anonymous. UK Government launchesIoT code. Network Security, 2018(3):2, March 2018. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485818300205.
Anonymous:2018:Bc
[4045] Anonymous. In brief. Network Secu-rity, 2018(3):3, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300217.
Anonymous:2018:SWA
[4046] Anonymous. Safety of Web appli-cations. Network Security, 2018(3):4, March 2018. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
sciencedirect.com/science/article/
pii/S1353485818300229.
Scott:2018:HZT
[4047] Barry Scott. How a zero trustapproach can help to secure yourAWS environment. Network Security,2018(3):5–8, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300230.
Shipulin:2018:WNT
[4048] Kirill Shipulin. We need to talk aboutIDS signatures. Network Security,2018(3):8–13, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4050] Colin Tankard. The threat of file-less trojans. Network Security,2018(3):20, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4052] Anonymous. UK organisations se-riously unprepared for cyber-attacks.Network Security, 2018(4):1–2, April2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
REFERENCES 486
URL http://www.sciencedirect.
com/science/article/pii/S135348581830028X.
Anonymous:2018:Bd
[4053] Anonymous. In brief. Network Secu-rity, 2018(4):3, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300291.
Anonymous:2018:PC
[4054] Anonymous. Port cybersecurity. Net-work Security, 2018(4):4, April 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300308.
Anonymous:2018:BBa
[4055] Anonymous. Bit by bit. Network Secu-rity, 2018(4):4, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581830031X.
Mackey:2018:BOS
[4056] Tim Mackey. Building open sourcesecurity into agile application builds.Network Security, 2018(4):5–8, April2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300321.
Bajpai:2018:AMI
[4057] Pranshu Bajpai, Aditya K. Sood, andRichard J. Enbody. The art of mappingIoT devices in networks. Network Secu-rity, 2018(4):8–15, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300333.
Bhardwaj:2018:RTS
[4058] Akashdeep Bhardwaj and Sam Goundar.Reducing the threat surface to min-imise the impact of cyber-attacks. Net-work Security, 2018(4):15–19, April2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300345.
Erridge:2018:TCR
[4059] Tim Erridge. True colours ofred teaming. Network Security,2018(4):20, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4061] Anonymous. One year after Wan-naCry: assessing the aftermath. Net-work Security, 2018(5):1–2, May 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300370.
Anonymous:2018:EVS
[4062] Anonymous. Equifax vulnerabil-ity still a problem. Network Secu-
[4063] Anonymous. Cyber-security BreachesSurvey: fraudulent emails presenta major menace. Network Secu-rity, 2018(5):3, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300394.
Anonymous:2018:Be
[4064] Anonymous. In brief. Network Secu-rity, 2018(5):4, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300400.
Anonymous:2018:BRS
[4065] Anonymous. Book review: Simplify-ing JavaScript, by Joe Morgan. Pub-lished by Pragmatic Bookshelf. ISBN:978-1-68050-288-6. Price: $39.95, 282pgs, paperback. Network Secu-rity, 2018(5):5, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300412.
James:2018:MCS
[4066] Lee James. Making cyber-securitya strategic business priority. Net-work Security, 2018(5):6–8, May 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
URL http://www.sciencedirect.
com/science/article/pii/S1353485818300424.
Aminzade:2018:CIA
[4067] Michael Aminzade. Confidentiality, in-tegrity and availability — finding a bal-anced IT framework. Network Secu-rity, 2018(5):9–11, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300436.
Sim:2018:DAM
[4068] Greg Sim. Defending against themalware flood. Network Security,2018(5):12–13, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300448.
Mansfield-Devine:2018:IWP
[4069] Steve Mansfield-Devine. The intel-ligent way to protect complex envi-ronments. Network Security, 2018(5):13–17, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581830045X.
Wilkins:2018:AIH
[4070] Jonathan Wilkins. Is artificial intel-ligence a help or hindrance? Net-work Security, 2018(5):18–19, May2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300461.
REFERENCES 488
Renaud:2018:CSA
[4071] Karen Renaud. Cooking up securityawareness & training. Network Secu-rity, 2018(5):20, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4075] Anonymous. Synopsis: Open sourcesecurity and risk analysis. Network Se-curity, 2018(6):3, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300515.
Anonymous:2018:Bf
[4076] Anonymous. In brief. Network Secu-rity, 2018(6):4, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300527.
Anonymous:2018:RMC
[4077] Anonymous. Research methods forcyber security. Network Security,2018(6):5, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300539.
Townsley:2018:BGC
[4078] Chris Townsley. Are businesses get-ting complacent when it comes toDDoS mitigation? Network Secu-rity, 2018(6):6–9, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300540.
Simmonds:2018:ICD
[4079] Mike Simmonds. Instilling a cul-ture of data security throughoutthe organisation. Network Security,2018(6):9–12, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300552.
Macy:2018:HBS
[4080] Jason Macy. How to build a se-cure API gateway. Network Security,2018(6):12–14, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 489
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300564.
Khan:2018:NCC
[4081] Javid Khan. The need for contin-uous compliance. Network Security,2018(6):14–15, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300576.
Mansfield-Devine:2018:FFH
[4082] Steve Mansfield-Devine. Friendlyfire: how penetration testing can re-duce your risk. Network Security,2018(6):16–19, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300588.
Tankard:2018:SDD
[4083] Colin Tankard. Streamlining data dis-covery. Network Security, 2018(6):20, June 2018. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.
[4100] Anonymous. In brief. Network Secu-rity, 2018(8):5, August 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581830076X.
Mason:2018:ORP
[4101] Mike Mason. Overcoming the risksof privileged user abuse in Sales-force. Network Security, 2018(8):6–8, August 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4111] Anonymous. In brief. Network Se-curity, 2018(9):5, September 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300874.
Macy:2018:ASW
[4112] Jason Macy. API security: whosejob is it anyway? Network Security,2018(9):6–9, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4114] Keegan Keplinger. Is quantum com-puting becoming relevant to cyber-security? Network Security, 2018
(9):16–19, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300904.
Renaud:2018:UON
[4115] Karen Renaud and Verena Zim-mermann. A user by any othername. Network Security, 2018(9):20, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4121] Anonymous. In brief. NetworkSecurity, 2018(10):5, October 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818300977.
Sens:2018:RFN
[4122] Ronald Sens. Be ready to fight new5G vulnerabilities. Network Security,2018(10):6–7, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300989.
Hogewoning:2018:IRS
[4123] Marco Hogewoning. IoT and reg-ulation — striking the right bal-ance. Network Security, 2018(10):8–10, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818300990.
Sollars:2018:LMW
[4124] Marc Sollars. Love and marriage:why security and SD-WAN need togo together. Network Security, 2018(10):10–12, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4132] Anonymous. National Cyber Se-curity Centre: Annual Review2018. Network Security, 2018(11):4, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818301089.
Anonymous:2018:Bk
[4133] Anonymous. In brief. Network Se-curity, 2018(11):5, November 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485818301090.
Bedell-Pearce:2018:SDT
[4134] Jack Bedell-Pearce. Safe digital trans-formation for SMEs. Network Security,2018(11):6–7, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818301107.
Roberts:2018:LLD
[4135] Steve Roberts. Learning lessons fromdata breaches. Network Security, 2018(11):8–11, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818301119.
Claxson:2018:SVE
[4136] Nick Claxson. Securing VoIP: en-crypting today’s digital telephony sys-tems. Network Security, 2018(11):11–13, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818301120.
Timms:2018:BCD
[4137] Paul Timms. Business continuityand disaster recovery — advice forbest practice. Network Security, 2018(11):13–14, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 495
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485818301132.
Mansfield-Devine:2018:NSA
[4138] Steve Mansfield-Devine. Nation-stateattacks: the start of a new ColdWar? Network Security, 2018(11):15–19, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4141] Anonymous. Securing the Internet ofThings — part one. Network Security,2018(12):1, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581830117X.
Anonymous:2018:FFD
[4142] Anonymous. Firms failing to discloseIoT vulnerabilities. Network Security,
2018(12):1–2, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4170] Anonymous. Digital transformationputs data at risk. Network Security,
2019(2):3, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300170.
Anonymous:2019:GSI
[4171] Anonymous. Gemalto: State ofIoT security. Network Security,2019(2):4, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300182.
Anonymous:2019:Bb
[4172] Anonymous. In brief. NetworkSecurity, 2019(2):5, February 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300194.
Rutherford:2019:ITS
[4173] Robert Rutherford. Internet of Things— striking the balance between compe-tition and security. Network Security,2019(2):6–8, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300200.
Keef:2019:UAD
[4174] Sean Keef. Using analytics-driven au-tomation to target the biggest vul-nerabilities. Network Security, 2019(2):8–11, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300212.
REFERENCES 499
Vincent:2019:DFP
[4175] Adam Vincent. Don’t feed thephish: how to avoid phishing at-tacks. Network Security, 2019(2):11–14, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300224.
Bindley:2019:JDH
[4176] Phil Bindley. Joining the dots: howto approach compliance and data gov-ernance. Network Security, 2019(2):14–16, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300236.
Yeoman:2019:HSB
[4177] Simon Yeoman. How secure are baremetal servers? Network Security, 2019(2):16–17, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300248.
Newman:2019:URD
[4178] Sean Newman. Under the radar:the danger of stealthy DDoS at-tacks. Network Security, 2019(2):18–19, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581930025X.
Pogrebna:2019:MFA
[4179] Ganna Pogrebna, Karen Renaud, andBoris Taratine. The many faces
of active cyber. Network Security,2019(2):20, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4185] Anonymous. Accenture/PonemonInstitute: the cost of cybercrime.Network Security, 2019(3):4, March2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300327.
Anonymous:2019:Bc
[4186] Anonymous. In brief. Network Secu-rity, 2019(3):5, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300339.
Klein:2019:MSS
[4187] Dave Klein. Micro-segmentation:securing complex cloud environ-ments. Network Security, 2019(3):6–10, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300340.
Canada:2019:RDW
[4188] Jesse Canada. Is reputationaldamage worse than a regulator’sfine? Network Security, 2019(3):11–12, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300352.
Schofield:2019:YWL
[4189] Greig Schofield. Has your wifi leftyou wide open to cybercrime? Net-work Security, 2019(3):13–14, March2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300364.
Haria:2019:GHS
[4190] Sam Haria. The growth of the hideand seek botnet. Network Security,2019(3):14–17, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300376.
Duncan:2019:HSY
[4191] Rory Duncan. How to secure yoursupply chain. Network Security, 2019(3):18–19, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300388.
Tankard:2019:IRF
[4192] Colin Tankard. IoT regulations:fact or fiction? Network Security,2019(3):20, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581930039X.
Anonymous:2019:ECc
[4193] Anonymous. Events calendar. Net-work Security, 2019(3):20, March
[4199] Daniel Goldberg. Living withdecade-old vulnerabilities in data-centre software. Network Security,2019(4):6–8, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300467.
Jewell:2019:ALA
[4200] Nick Jewell. The analytics lifecycle andthe age of innovation. Network Secu-rity, 2019(4):8–11, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300479.
Giese:2019:EEI
[4201] Sascha Giese. The endpoint epidemicof IoT — just a bad dream? Net-work Security, 2019(4):11–12, April2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300480.
Herbert:2019:PSO
[4202] Sean Herbert. Preventing soft-ware from opening doors to thenetwork. Network Security, 2019(4):13–15, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300492.
REFERENCES 502
Mathews:2019:WCM
[4203] Alex Mathews. What can ma-chine learning do for information se-curity? Network Security, 2019(4):15–17, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300509.
Boughton:2019:PIC
[4204] Nick Boughton. Protecting infras-tructure from cyber attack. Net-work Security, 2019(4):18–19, April2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300510.
Spence:2019:NFR
[4205] Dave Spence. The non-functionalrequirement fallacy. Network Secu-rity, 2019(4):20, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4207] Anonymous. UK Government of-fers initiatives and assurances. Net-work Security, 2019(5):1–3, May 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).
[4222] Anonymous. Mimecast: the State ofEmail Security Report 2019. Net-
REFERENCES 504
work Security, 2019(6):4, June 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300698.
Anonymous:2019:Bf
[4223] Anonymous. In brief. Network Secu-rity, 2019(6):5, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300704.
Team:2019:EEL
[4224] SophosLabs Research Team. Emotetexposed: looking inside highly de-structive malware. Network Security,2019(6):6–11, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300716.
Boughton:2019:PWC
[4225] Nick Boughton. Protecting the worldof connected devices. Network Security,2019(6):11–13, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300728.
Macy:2019:PVT
[4226] Jason Macy. Product vs toolkit: APIand IAM security. Network Security,2019(6):13–15, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581930073X.
Bhardwaj:2019:FET
[4227] Akashdeep Bhardwaj and Sam Goundar.A framework for effective threathunting. Network Security, 2019(6):15–19, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300741.
Renaud:2019:EPM
[4228] Karen Renaud and Verena Zim-mermann. Encouraging passwordmanager use. Network Security,2019(6):20, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4230] Anonymous. War breaks out be-tween US and Iran in cyberspace.Network Security, 2019(7):1–3, July2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[4232] Anonymous. China attacks ma-jor tech firms. Network Security,2019(7):3, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300790.
Anonymous:2019:SMD
[4233] Anonymous. Sikich: 2019 Manu-facturing and Distribution Report.Network Security, 2019(7):4, July2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300807.
Anonymous:2019:Bg
[4234] Anonymous. In brief. Network Secu-rity, 2019(7):5, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300819.
Roytman:2019:CPP
[4235] Michael Roytman and Jay Ja-cobs. The complexity of priori-tising patching. Network Security,2019(7):6–9, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300820.
Herbert:2019:WIS
[4236] Sean Herbert. Why IIoT shouldmake businesses rethink security. Net-work Security, 2019(7):9–11, July
[4237] Paul Breitbarth. The impact ofGDPR one year on. Network Security,2019(7):11–13, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300844.
Barker:2019:VHW
[4238] Peter Barker. Visual hacking —why it matters and how to pre-vent it. Network Security, 2019(7):14–17, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300856.
Oetjen:2019:UAI
[4239] Jan Oetjen. Using artificial intelli-gence in the fight against spam. Net-work Security, 2019(7):17–19, July2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819300868.
Tankard:2019:WYN
[4240] Colin Tankard. Why you need cy-ber essentials. Network Security,2019(7):20, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4242] Anonymous. More data breaches com-promise millions of records. Net-work Security, 2019(8):1–3, August2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[4245] Anonymous. NCSC: Active Cy-ber Defence (ACD) — The Sec-ond Year. Network Security, 2019(8):4, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300923.
Anonymous:2019:Bh
[4246] Anonymous. In brief. Network Secu-rity, 2019(8):5, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819300935.
Skelly:2019:WTW
[4247] Keenan Skelly. It’s a war out there:why malicious hackers are beating busi-nesses to the punch — and what wecan do about it. Network Security,2019(8):6–8, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4254] Anonymous. Dramatic rise in databreaches, with Yves Rocher, Mon-ster and ECB among latest to behit. Network Security, 2019(9):1–3, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4260] Roger Grimes. The many ways tohack 2FA. Network Security, 2019(9):8–13, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301072.
Baldin:2019:BPF
[4261] Andy Baldin. Best practices forfighting the fileless threat. NetworkSecurity, 2019(9):13–15, September2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819301084.
Walker:2019:WDP
[4262] Paul Walker. Why do PAM projectsfail? Network Security, 2019(9):15–18, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301096.
Bunting:2019:CSH
[4263] Charlene Bunting. Cloud security:how to protect critical data and stayproductive. Network Security, 2019(9):18–19, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301102.
Goodall:2019:IIS
[4264] Richard Goodall. The ideal indus-trial SOC. Network Security, 2019(9):20, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),
[4272] Anonymous. In brief. NetworkSecurity, 2019(10):5, October 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819301199.
Heritage:2019:PIC
[4273] Ian Heritage. Protecting Industry 4.0:challenges and solutions as IT, OTand IP converge. Network Security,2019(10):6–9, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301205.
Mansfield-Devine:2019:SOT
[4274] Steve Mansfield-Devine. The state ofoperational technology security. Net-work Security, 2019(10):9–13, October2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819301217.
Bhardwaj:2019:CSA
[4275] Akashdeep Bhardwaj, Vinay Avasthi,and Sam Goundar. Cyber se-curity attacks on robotic plat-forms. Network Security, 2019(10):13–19, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301229.
Tankard:2019:GSH
[4276] Colin Tankard. Goodbye SIEM, helloSOARX. Network Security, 2019(10):20, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4282] Anonymous. In brief. Network Se-curity, 2019(11):5, November 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819301291.
Knauer:2019:HCC
[4283] Chris Knauer. How contact centrescan leave businesses exposed to cy-bercrime. Network Security, 2019
(11):6–9, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301308.
Stitt:2019:OWR
[4284] Tom Stitt. Office walls and road-blocks: how workflows and termi-nology get in the way of visibil-ity. Network Security, 2019(11):9–13, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348581930131X.
Homan:2019:IDS
[4285] Stu Homan. The importanceof domains to security manage-ment. Network Security, 2019(11):13–15, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301321.
Aleem:2019:TWW
[4286] Azeem Aleem. Treading water: why or-ganisations are making no progress oncyber security. Network Security, 2019(11):15–18, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301333.
Kunneke-Trenaman:2019:RFR
[4287] Nathalie Kunneke-Trenaman. RPKIand the future of routing secu-rity. Network Security, 2019(11):18–19, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 511
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301345.
Renaud:2019:SWS
[4288] Karen Renaud and Marc Dupuis.Should we scare people into behav-ing securely? Network Security, 2019(11):20, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4294] Anonymous. In brief. Network Se-curity, 2019(12):5, December 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485819301412.
Callan:2019:CEV
[4295] Tim Callan and Chris Bailey. Changesto extended validation indicators putusers at risk. Network Security, 2019(12):6–8, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301424.
Thompson:2019:AAC
[4296] Steve Thompson. Apprenticeshipsas the answer to closing the cyberskills gap. Network Security, 2019(12):9–11, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301436.
REFERENCES 512
Al-kasassbeh:2019:WTD
[4297] Mouhammd Al-kasassbeh and TariqKhairallah. Winning tactics with DNStunnelling. Network Security, 2019(12):12–19, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485819301448.
Spence:2019:RSC
[4298] Dave Spence. Resilience in the sup-ply chain. Network Security, 2019(12):20, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4300] Anonymous. Ring under fire overweakness in video device secu-rity. Network Security, 2020(1):1–2, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4304] Anonymous. Upstream security:2020 Global Automotive Cyber se-curity Report. Network Security,2020(1):4, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300052.
Anonymous:2020:Ba
[4305] Anonymous. In brief. Network Secu-rity, 2020(1):5, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300064.
Reynolds:2020:TRD
[4306] Roy Reynolds. It’s time to rethinkDDoS protection. Network Security,2020(1):6–8, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 513
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300076.
Andreu:2020:OTS
[4307] Andres Andreu. Operational tech-nology security — a data per-spective. Network Security, 2020(1):8–13, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300088.
Gordon:2020:SWB
[4308] Scott Gordon. Securing workers be-yond the perimeter. Network Security,2020(1):14–16, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S135348582030009X.
Bunker:2020:TCA
[4309] Guy Bunker. Targeted cyber at-tacks: how to mitigate the increas-ing risk. Network Security, 2020(1):17–19, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300106.
Tankard:2020:PV
[4310] Colin Tankard. The power ofvoice. Network Security, 2020(1):20, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4327] Anonymous. In brief. Network Secu-rity, 2020(3):5, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300283.
Reynolds:2020:FBM
[4328] Roy Reynolds. The four biggest mal-ware threats to UK businesses. Net-work Security, 2020(3):6–8, March2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[4330] Colby Dyess. Maintaining a bal-ance between agility and security inthe cloud. Network Security, 2020(3):14–17, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300313.
Geenens:2020:HWS
[4331] Pascal Geenens. How worriedshould you be about nation-state at-tacks? Network Security, 2020(3):17–19, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300325.
Renaud:2020:SPC
[4332] Karen Renaud. Strong passwords can’tkeep children safe. Network Secu-rity, 2020(3):20, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4337] Anonymous. Linux servers exploitedfor a decade. Network Security,2020(4):3, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300386.
Anonymous:2020:WIS
[4338] Anonymous. Watchguard: Internet Se-curity Report Q4 2019. Network Secu-rity, 2020(4):4, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300398.
Anonymous:2020:Bd
[4339] Anonymous. In brief. Network Secu-rity, 2020(4):5, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300404.
Ray:2020:DDN
[4340] Terry Ray. DDoS defence: newtactics for a rising shadow in-dustry. Network Security, 2020(4):6–7, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300416.
Chapman:2020:YIS
[4341] Phil Chapman. Are your IT staffready for the pandemic-driven in-sider threat? Network Security,2020(4):8–11, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4343] Simon Kelf. The security risks cre-ated by cloud migration and how toovercome them. Network Security,2020(4):14–16, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300441.
REFERENCES 517
Higgins:2020:IRW
[4344] David Higgins. Innovation andrisk walk hand-in-hand with 5Gand IoT. Network Security, 2020(4):16–18, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300453.
Hockey:2020:UCS
[4345] Alyn Hockey. Uncovering the cy-ber security challenges in health-care. Network Security, 2020(4):18–19, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300465.
Fox:2020:LHT
[4346] David Fox. Losing the human touch.Network Security, 2020(4):20, April2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[4351] Anonymous. New North Ko-rean threats. Network Security,2020(5):3, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300520.
Anonymous:2020:ACR
[4352] Anonymous. AT&T Cybersecurity: therelationship between security maturityand business enablement. Network Se-curity, 2020(5):4, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300532.
Anonymous:2020:Be
[4353] Anonymous. In brief. Network Secu-rity, 2020(5):5, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),
REFERENCES 518
1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300544.
Malecki:2020:OSP
[4354] Florian Malecki. Optimising stor-age processes to reduce the riskof ransomware. Network Security,2020(5):6–8, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300556.
Meryem:2020:HID
[4355] Amar Meryem and Bouabid ElOuahidi. Hybrid intrusion detec-tion system using machine learning.Network Security, 2020(5):8–19, May2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485820300568.
Tankard:2020:PUN
[4356] Colin Tankard. Pandemic under-pins need for SOAR. Network Secu-rity, 2020(5):20, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
[4363] Anonymous. In brief. Network Secu-rity, 2020(6):5, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300647.
Powell:2020:HDC
[4364] Leila Powell. How data canbe the lingua franca for secu-rity and IT. Network Security,2020(6):6–7, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300659.
Hampton:2020:KSH
[4365] Paul Hampton. Keeping a secure holdon data through modern electronic con-tent management. Network Security,2020(6):8–11, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300660.
Evangelakos:2020:KCA
[4366] Gus Evangelakos. Keeping criti-cal assets safe when teleworking isthe new norm. Network Security,2020(6):11–14, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300672.
Bulpett:2020:SAI
[4367] Ben Bulpett. Safeguarding againstthe insider threat. Network Security,2020(6):14–17, June 2020. CODEN
[4368] Thomas Deighton and Michael Wake-field. Keep security top of mindwhen moving into the cloud. Net-work Security, 2020(6):17–19, June2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
com/science/article/pii/S1353485820300696.
MacMillan:2020:TC
[4369] Kate MacMillan. Trusting the CISO.Network Security, 2020(6):20, June2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.
[4376] Anonymous. In brief. Network Secu-rity, 2020(7):5, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300775.
Cope:2020:SSS
[4377] Rod Cope. Strong security starts withsoftware development. Network Secu-rity, 2020(7):6–9, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300787.
Jartelius:2020:DBI
[4378] Martin Jartelius. The 2020 DataBreach Investigations Report — aCSO’s perspective. Network Secu-rity, 2020(7):9–12, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300799.
Lim:2020:AMC
[4379] Mieng Lim. Avoiding the mostcommon vulnerability-managementpitfalls. Network Security, 2020(7):12–14, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300805.
Wood:2020:APD
[4380] Simon Wood. Adhering to pri-vacy by design with identity-as-a-service. Network Security, 2020(7):14–17, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:
//www.sciencedirect.com/science/
article/pii/S1353485820300817.
Murray:2020:OSS
[4381] Dale Murray. Open source and se-curity: why transparency now equals