1. Optimising risk management. Issue 2 (February 2017) Authors: Erridge, Tim Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 20 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Retailers must focus on the growing cyberthreat landscape. Issue 2 (February 2017) Authors: Schenk, Gert-Jan Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 12 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Ransomware becomes the most prevalent form of malware and hits an ever-wider range of victims. Issue 2 (February 2017) Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Understanding the Digital World. Issue 2 (February 2017) Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 4 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. In brief. Issue 2 (February 2017) Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 3 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. A process of defence – securing industrial control systems. Issue 2 (February 2017) Authors: Mansfield-Devine, Steve Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 14 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. When big data and Brexit collide. Issue 2 (February 2017) Authors: Bedell-Pearce, Jack Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 8 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. What is intellectual property and how do you protect it?. Issue 2 (February 2017) Authors: Graves, Jamie Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 9 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Events calendar. Issue 2 (February 2017) Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 20 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. IMSI catchers: hacking mobile communications. Issue 2 (February 2017) Authors: Lilly, Andy Journal: Network security Issue: Volume 2017:Issue 2(2017:Feb.) Page Start: 5 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗