Network Security
The new look Network Security is devoted to solving your network security problems in system-specific detail, now with even more news, information and solutions to your network security problems.
Subscribe today and identify the threats to your networks immediately!
Every month Network Security covers:
• Worldwide news - the latest in LAN/WAN vulnerabilities and solutions, virus detection and data recovery, international developments, recent company mergers to reinforce network security solutions
• Regular industry columns - the inside view from our board of experts
• Authoritative news and analysis on the major networks and their operations and the impact on your organization
• In-depth technical feature articles - practical advice and guidance on key management concerns plus critical evaluations of technical issues and industry trends
• Regular case studies, legal brief and Cybernet features, highlights from recent conferences, book reviews and a comprehensive calendar of events
Network Security provides vital information for:
• Network and Telecommunications Managers
• Planners
• Analysts and Operations Managers
• Computer and Information Security Managers
• Systems Administrators
• IS Management
• Manufacturers, suppliers, and resellers of networking hardware and software
• Technical Planning Management for Carriers
Editor: Steve Mansfield-Devine
Imprint: Elsevier Advanced Technology
ISSN: 1353-4858
Most cited
Top 10 Cited (articles published in the last five years)
Extracted from Scopus (on Thu Jun 27)Mansfield-Devine, S. Danger in the clouds Network Security, Volume 2008, Issue 12, 2008-12-01, Pages 9-11 Coursen, S. The future of mobile malware Network Security, Volume 2007, Issue 8, 2007-08-01, Pages 7-11 Taylor, M. | Haggerty, J. | Gresty, D. | Lamb, D. Forensic investigation of cloud computing systems Network Security, Volume 2011, Issue 3, 2011-03-01, Pages 4-10 Rexworthy, B. Intrusion detections systems - an outmoded network protection model Network Security, Volume 2009, Issue 6, 2009-06-01, Pages 17-19 Mansfield-Devine, S. Anti-social networking: exploiting the trusting environment of Web 2.0 Network Security, Volume 2008, Issue 11, 2008-11-01, Pages 4-7 Laurie, A. Practical attacks against RFID Network Security, Volume 2007, Issue 9, 2007-09-01, Pages 4-7 Sloan, K. Security in a virtualised world Network Security, Volume 2009, Issue 8, 2009-08-01, Pages 15-18 Forte, D. Security standardization in incident management: the ITIL approach Network Security, Volume 2007, Issue 1, 2007-01-01, Pages 14-16 Smith, D. The challenge of federated identity management Network Security, Volume 2008, Issue 4, 2008-04-01, Pages 7-9 Heron, S. Working the botnet: how dynamic DNS is revitalising the zombie army Network Security, Volume 2007, Issue 1, 2007-01-01, Pages 9-11 - View all items
Most downloaded
Most Read Articles - counted by Article downloads on SciVerse ScienceDirect in the period 01 April 2002 to 31 May 2013
Thu Jun 271 Steve Mansfield-Devine Danger in the clouds Network Security, Volume 2008, Issue 12, December 2008, Pages 9-11 2 Alan Goode Managing mobile security: How are we doing? Network Security, Volume 2010, Issue 2, February 2010, Pages 12-15 3 Gordon Thomson BYOD: enabling the chaos Network Security, Volume 2012, Issue 2, February 2012, Pages 5-8 4 Mark Taylor | John Haggerty | David Gresty | David Lamb Forensic investigation of cloud computing systems Network Security, Volume 2011, Issue 3, March 2011, Pages 4-10 5 Paul Ritchie The security risks of AJAX/web 2.0 applications Network Security, Volume 2007, Issue 3, March 2007, Pages 4-8 6 Steve Mansfield-Devine Anti-social networking: exploiting the trusting environment of Web 2.0 Network Security, Volume 2008, Issue 11, November 2008, Pages 4-7 7 Steve Mansfield-Devine Hacktivism: assessing the damage Network Security, Volume 2011, Issue 8, August 2011, Pages 5-13 8 Danny Bradbury Hacking wifi the easy way Network Security, Volume 2011, Issue 2, February 2011, Pages 9-12 9 Richard Blandford Information security in the cloud Network Security, Volume 2011, Issue 4, April 2011, Pages 15-17 10 Dario Forte Security standardization in incident management: the ITIL approach Network Security, Volume 2007, Issue 1, January 2007, Pages 14-16 - View all items
Recent articles
Thu Jun 271 PandaLabs says the fight against cybercrime is being won Network Security, Volume 2013, Issue 6, June 2013, Pages 1-2 2 Keith Barker The security implications of IPv6 Network Security, Volume 2013, Issue 6, June 2013, Pages 5-9 3 McAfee says it's business as usual Network Security, Volume 2013, Issue 6, June 2013, Pages 2- 4 US warns of increased cyber-attacks by Iran Network Security, Volume 2013, Issue 6, June 2013, Pages 19-20 5 NATO under attack Network Security, Volume 2013, Issue 6, June 2013, Pages 20- 6 Journalists threatened with data protection laws after using exposed information Network Security, Volume 2013, Issue 6, June 2013, Pages 20- 7 Steve Mansfield-Devine Q&A: Colin Tankard 𢀓 raising security awareness Network Security, Volume 2013, Issue 6, June 2013, Pages 16-19 8 Steve Gold Getting lost on the Internet: the problem with anonymity Network Security, Volume 2013, Issue 6, June 2013, Pages 10-13 9 Tim Brooks Classic enterprise IT: the castle approach Network Security, Volume 2013, Issue 6, June 2013, Pages 14-16 10 Jane Grafton Avoiding the five pitfalls of privileged accounts Network Security, Volume 2013, Issue 5, May 2013, Pages 12-14 - View all items

