1. Managing your data risk: back to basics. (August 2015) Authors: Richter, Chris Journal: Network security Issue: (2015:Aug.) Page Start: 13 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Move to intelligence-driven security. (August 2015) Authors: Knights, Ricky; Morris, Emma Journal: Network security Issue: (2015:Aug.) Page Start: 15 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Events calendar. (August 2015) Journal: Network security Issue: (2015:Aug.) Page Start: 20 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Hacking Web Intelligence. (August 2015) Journal: Network security Issue: (2015:Aug.) Page Start: 4 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Android Stagefright vulnerability threatens all devices – and fixing it isn't that easy. (August 2015) Journal: Network security Issue: (2015:Aug.) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. In brief. (August 2015) Journal: Network security Issue: (2015:Aug.) Page Start: 3 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. The Book of GNS3. (August 2015) Journal: Network security Issue: (2015:Aug.) Page Start: 4 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. The digital identity issue. (August 2015) Authors: Simmonds, Paul Journal: Network security Issue: (2015:Aug.) Page Start: 8 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. UK public sector weak on security. (August 2015) Journal: Network security Issue: (2015:Aug.) Page Start: 2 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Cyber-security fortresses built on quicksand. (August 2015) Authors: Smyth, Vincent Journal: Network security Issue: (2015:Aug.) Page Start: 5 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗