nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A computer security nightmare
|
Highland, Harold J. |
|
1991 |
|
2 |
p. 6-7 2 p. |
artikel |
2 |
A fishy story
|
|
|
1980 |
|
2 |
p. 6-7 2 p. |
artikel |
3 |
A guide to intellectual property protection in the US
|
|
|
1986 |
|
2 |
p. 1-7 7 p. |
artikel |
4 |
Airline fraud
|
|
|
1978 |
|
2 |
p. 18- 1 p. |
artikel |
5 |
An honest mistake
|
|
|
1979 |
|
2 |
p. 1-2 2 p. |
artikel |
6 |
An introduction
|
Sommer, Peter |
|
1993 |
|
2 |
p. 10-15 6 p. |
artikel |
7 |
An ODE for computer security
|
Monro, Duncan |
|
1990 |
|
2 |
p. 15-19 5 p. |
artikel |
8 |
A practical approach to logical access control
|
Sommer, Peter |
|
1994 |
|
2 |
p. 19- 1 p. |
artikel |
9 |
A recovery case study
|
Hall, DavidJ. |
|
1990 |
|
2 |
p. 10-13 4 p. |
artikel |
10 |
A report on the Panama diskette
|
Gliss, Hans |
|
1990 |
|
2 |
p. 6-10 5 p. |
artikel |
11 |
Arrest for Internet crimes
|
|
|
1995 |
|
2 |
p. 2- 1 p. |
artikel |
12 |
Arson suspected
|
|
|
1978 |
|
2 |
p. 13- 1 p. |
artikel |
13 |
ATM security relies on ‘consumer education’
|
|
|
1990 |
|
2 |
p. 4- 1 p. |
artikel |
14 |
AT&T interruptions continue
|
Menkus, Belden |
|
1992 |
|
2 |
p. 1-3 3 p. |
artikel |
15 |
Auditors call for new legislation
|
|
|
1990 |
|
2 |
p. 3-4 2 p. |
artikel |
16 |
Australian company develops Computer Safeguard
|
|
|
1987 |
|
2 |
p. 10-11 2 p. |
artikel |
17 |
Australian government amends software sales tax law
|
Rees, Frank |
|
1988 |
|
2 |
p. 4- 1 p. |
artikel |
18 |
Australian virus group is founded
|
|
|
1991 |
|
2 |
p. 3- 1 p. |
artikel |
19 |
Automated support of risk management
|
|
|
1982 |
|
2 |
p. 5-11 7 p. |
artikel |
20 |
Automotive parts maker pays for pirated software
|
|
|
1995 |
|
2 |
p. 4- 1 p. |
artikel |
21 |
39 bank accounts
|
|
|
1978 |
|
2 |
p. 13- 1 p. |
artikel |
22 |
Bank workers held after computer sabotage
|
|
|
1991 |
|
2 |
p. 5- 1 p. |
artikel |
23 |
BBN communications halves cost of network access security system
|
|
|
1988 |
|
2 |
p. 3-4 2 p. |
artikel |
24 |
Big brother watches Australia
|
|
|
1991 |
|
2 |
p. 3-4 2 p. |
artikel |
25 |
Biometrics seminar
|
|
|
1988 |
|
2 |
p. 20- 1 p. |
artikel |
26 |
Blank payment warrants
|
|
|
1978 |
|
2 |
p. 12- 1 p. |
artikel |
27 |
British skill shortage
|
|
|
1989 |
|
2 |
p. 2-3 2 p. |
artikel |
28 |
BSA announces piracy prosecutions in Europe
|
|
|
1991 |
|
2 |
p. 4-5 2 p. |
artikel |
29 |
BSA cracks down on small companies suspected of software piracy
|
Riggs, Brian |
|
1994 |
|
2 |
p. 9-10 2 p. |
artikel |
30 |
BSA hunts Singapore pirates
|
|
|
1990 |
|
2 |
p. 2-3 2 p. |
artikel |
31 |
Calculating the cost of delay (Cont'd)
|
Jacobson, Bob |
|
1981 |
|
2 |
p. 3-5 3 p. |
artikel |
32 |
Californian crack-down
|
|
|
1989 |
|
2 |
p. 2- 1 p. |
artikel |
33 |
Case studies: Vulnerability of dial-up access to computers
|
|
|
1979 |
|
2 |
p. 10-16 7 p. |
artikel |
34 |
CD-ROM not safe from piracy
|
|
|
1994 |
|
2 |
p. 4- 1 p. |
artikel |
35 |
CFSB interview no 1
|
|
|
1981 |
|
2 |
p. 5-6 2 p. |
artikel |
36 |
Charges dropped against student
|
|
|
1995 |
|
2 |
p. 2-3 2 p. |
artikel |
37 |
Cheating the computer
|
|
|
1979 |
|
2 |
p. 4-5 2 p. |
artikel |
38 |
Cleaning up trade shows
|
Riggs, Brian |
|
1995 |
|
2 |
p. 3- 1 p. |
artikel |
39 |
Client/server, a security risk?
|
|
|
1994 |
|
2 |
p. 1-2 2 p. |
artikel |
40 |
Compsec '89
|
Monk, Tina |
|
1989 |
|
2 |
p. 5-7 3 p. |
artikel |
41 |
Compsec report
|
|
|
1987 |
|
2 |
p. 1-3 3 p. |
artikel |
42 |
Computer component theft
|
|
|
1983 |
|
2 |
p. 6- 1 p. |
artikel |
43 |
Computer crime insurance — the tangled web
|
|
|
1981 |
|
2 |
p. 1-2 2 p. |
artikel |
44 |
Computer evidence
|
|
|
1984 |
|
2 |
p. 1-6 6 p. |
artikel |
45 |
Computer misuse act strengthened
|
|
|
1994 |
|
2 |
p. 5- 1 p. |
artikel |
46 |
Computer people
|
|
|
1978 |
|
2 |
p. 10- 1 p. |
artikel |
47 |
Computers get out of control
|
|
|
1980 |
|
2 |
p. 8-9 2 p. |
artikel |
48 |
Computer users year book: Review
|
|
|
1979 |
|
2 |
p. 6- 1 p. |
artikel |
49 |
Consortium on software protection
|
|
|
1983 |
|
2 |
p. 1-3 3 p. |
artikel |
50 |
Contingency planning
|
|
|
1980 |
|
2 |
p. 10-11 2 p. |
artikel |
51 |
Controlling systems programmers
|
Ross, StevenJ. |
|
1989 |
|
2 |
p. 7-10 4 p. |
artikel |
52 |
CORPORATE COMPUTER SECURITY ’90
|
|
|
1990 |
|
2 |
p. 19-20 2 p. |
artikel |
53 |
Cost plus contract fraud
|
|
|
1979 |
|
2 |
p. 5-6 2 p. |
artikel |
54 |
Counting the cost at Security Pacific Bank
|
Jacobson, R.V. |
|
1979 |
|
2 |
p. 2-3 2 p. |
artikel |
55 |
Credit firms test data protection act
|
|
|
1990 |
|
2 |
p. 4- 1 p. |
artikel |
56 |
Cyberpunk: Outlaws and hackers on the computer frontier
|
Davidson, Clive |
|
1992 |
|
2 |
p. 20- 1 p. |
artikel |
57 |
Data and information security in Norwegial banking
|
Kvam, Lars |
|
1988 |
|
2 |
p. 4-6 3 p. |
artikel |
58 |
Databases that talk too much
|
Snell, Monica |
|
1994 |
|
2 |
p. 9- 1 p. |
artikel |
59 |
Datakeep M.D. explains philosophy
|
|
|
1978 |
|
2 |
p. 5-7 3 p. |
artikel |
60 |
Data matching not justified in most cases
|
Madsen, Wayne |
|
1994 |
|
2 |
p. 8-9 2 p. |
artikel |
61 |
Data privacy row hits Hongkong
|
|
|
1993 |
|
2 |
p. 3- 1 p. |
artikel |
62 |
Directories
|
|
|
1978 |
|
2 |
p. 17-18 2 p. |
artikel |
63 |
Direct sequence spread spectrum access to local area networks
|
Spracklen, Tim |
|
1986 |
|
2 |
p. 7-15 9 p. |
artikel |
64 |
Disaster recovery site loses power
|
Menkus, Belden |
|
1992 |
|
2 |
p. 3-4 2 p. |
artikel |
65 |
Dutch Government fails privacy audit
|
Gannon, Paul |
|
1993 |
|
2 |
p. 3- 1 p. |
artikel |
66 |
Dutch hacker video now out
|
|
|
1992 |
|
2 |
p. 3- 1 p. |
artikel |
67 |
Editorial
|
|
|
1978 |
|
2 |
p. 1- 1 p. |
artikel |
68 |
Editorial Board
|
|
|
1991 |
|
2 |
p. 1- 1 p. |
artikel |
69 |
Electronic picketing
|
Lack, Kelvin |
|
1989 |
|
2 |
p. 10-12 3 p. |
artikel |
70 |
Encryption export legislation proposed
|
Madsen, Wayne |
|
1994 |
|
2 |
p. 6-7 2 p. |
artikel |
71 |
Encryption slow to catch on
|
|
|
1981 |
|
2 |
p. 6-7 2 p. |
artikel |
72 |
Events
|
|
|
1995 |
|
2 |
p. 20- 1 p. |
artikel |
73 |
Events
|
|
|
1993 |
|
2 |
p. 18-19 2 p. |
artikel |
74 |
Events
|
|
|
1994 |
|
2 |
p. 20- 1 p. |
artikel |
75 |
Events
|
|
|
1991 |
|
2 |
p. 17-18 2 p. |
artikel |
76 |
Events
|
|
|
1992 |
|
2 |
p. 19- 1 p. |
artikel |
77 |
Events
|
|
|
1989 |
|
2 |
p. 19-20 2 p. |
artikel |
78 |
15 face fraud charges
|
|
|
1994 |
|
2 |
p. 3- 1 p. |
artikel |
79 |
Failed card fraudsters sentenced
|
|
|
1994 |
|
2 |
p. 2- 1 p. |
artikel |
80 |
FANB employee arrested
|
|
|
1978 |
|
2 |
p. 12-13 2 p. |
artikel |
81 |
FAST bogged down by software piracy
|
|
|
1995 |
|
2 |
p. 3-4 2 p. |
artikel |
82 |
Fast response to EC
|
|
|
1989 |
|
2 |
p. 1-2 2 p. |
artikel |
83 |
Fighting mobile phone fraud — Part 2
|
Wong, Ken |
|
1995 |
|
2 |
p. 10-14 5 p. |
artikel |
84 |
Fraud prevention and computer security for financial institutions — Part 1
|
Essinger, James |
|
1995 |
|
2 |
p. 17-19 3 p. |
artikel |
85 |
Fraudulent electronics order
|
|
|
1978 |
|
2 |
p. 13- 1 p. |
artikel |
86 |
Frozen data
|
|
|
1985 |
|
2 |
p. 15-16 2 p. |
artikel |
87 |
Further controversy over electronic surveillance
|
|
|
1994 |
|
2 |
p. 3-4 2 p. |
artikel |
88 |
Further losses from voicemail fraud
|
|
|
1995 |
|
2 |
p. 1-2 2 p. |
artikel |
89 |
Gangsters catch up with the computer era
|
|
|
1979 |
|
2 |
p. 3-4 2 p. |
artikel |
90 |
Government stance on Internet porn
|
|
|
1995 |
|
2 |
p. 4-5 2 p. |
artikel |
91 |
Hacking debate at Westminster
|
|
|
1990 |
|
2 |
p. 5-6 2 p. |
artikel |
92 |
Hacking for profit
|
|
|
1985 |
|
2 |
p. 15- 1 p. |
artikel |
93 |
Hands on computer fraud seminar
|
|
|
1981 |
|
2 |
p. 2-3 2 p. |
artikel |
94 |
How much should companies reveal?
|
|
|
1978 |
|
2 |
p. 4-5 2 p. |
artikel |
95 |
IBM moves to protect itself
|
|
|
1980 |
|
2 |
p. 7- 1 p. |
artikel |
96 |
Identification technologies: Book review
|
|
|
1979 |
|
2 |
p. 6-7 2 p. |
artikel |
97 |
Illinois Bell does it again — twice
|
Menkus, Belden |
|
1991 |
|
2 |
p. 3- 1 p. |
artikel |
98 |
Index
|
|
|
1982 |
|
2 |
p. 1- 1 p. |
artikel |
99 |
Infiltrating the system - part II counter measures
|
Jacobson, Bob |
|
1980 |
|
2 |
p. 12-15 4 p. |
artikel |
100 |
Information security and intelligence
|
Madsen, Wayne |
|
1992 |
|
2 |
p. 6-10 5 p. |
artikel |
101 |
Information security guide
|
|
|
1989 |
|
2 |
p. 19- 1 p. |
artikel |
102 |
In next month's issue…
|
|
|
1988 |
|
2 |
p. 20- 1 p. |
artikel |
103 |
International initiatives in legislation
|
|
|
1989 |
|
2 |
p. 15-19 5 p. |
artikel |
104 |
Internet ethics
|
Dwan, Berni |
|
1995 |
|
2 |
p. 14-17 4 p. |
artikel |
105 |
Investigating inside the corporation
|
Tipton, Hal |
|
1993 |
|
2 |
p. 4-10 7 p. |
artikel |
106 |
IS managers beware! OLE may open the door to hackers
|
Riggs, Brian |
|
1994 |
|
2 |
p. 7-8 2 p. |
artikel |
107 |
Is the ‘Orange Book’ flawed?
|
|
|
1990 |
|
2 |
p. 3- 1 p. |
artikel |
108 |
Law commission's report debated
|
|
|
1989 |
|
2 |
p. 3-4 2 p. |
artikel |
109 |
Laws and computer crime: Letter to the ed.
|
|
|
1983 |
|
2 |
p. 6-7 2 p. |
artikel |
110 |
Lessons from a Swedish study of computer crimes
|
Solarz, Artur |
|
1988 |
|
2 |
p. 6-12 7 p. |
artikel |
111 |
Lightning destroys Israeli database
|
|
|
1992 |
|
2 |
p. 5- 1 p. |
artikel |
112 |
Logica develops new speaker verification technique for security applications
|
Essinger, James |
|
1988 |
|
2 |
p. 16-18 3 p. |
artikel |
113 |
Mad Hacker tries to clear his name
|
|
|
1995 |
|
2 |
p. 2- 1 p. |
artikel |
114 |
Marine fraud
|
|
|
1978 |
|
2 |
p. 18- 1 p. |
artikel |
115 |
Marketplace
|
|
|
1995 |
|
2 |
p. 5-6 2 p. |
artikel |
116 |
Marketplace
|
|
|
1994 |
|
2 |
p. 5-6 2 p. |
artikel |
117 |
Marketplace
|
|
|
1991 |
|
2 |
p. 5-6 2 p. |
artikel |
118 |
Marketplace
|
|
|
1992 |
|
2 |
p. 5-6 2 p. |
artikel |
119 |
Marketplace
|
|
|
1990 |
|
2 |
p. 6- 1 p. |
artikel |
120 |
Marketplace
|
|
|
1989 |
|
2 |
p. 4-5 2 p. |
artikel |
121 |
$9 million computer blackmail plot
|
|
|
1990 |
|
2 |
p. 1-2 2 p. |
artikel |
122 |
Miscellaneous frauds
|
|
|
1982 |
|
2 |
p. 1-3 3 p. |
artikel |
123 |
6 months before fraud discovered
|
|
|
1978 |
|
2 |
p. 14- 1 p. |
artikel |
124 |
More computers, more crime
|
|
|
1994 |
|
2 |
p. 2- 1 p. |
artikel |
125 |
More e-mail legal actions
|
Menkus, Belden |
|
1992 |
|
2 |
p. 4-5 2 p. |
artikel |
126 |
More on securicom '83
|
|
|
1982 |
|
2 |
p. 11-12 2 p. |
artikel |
127 |
Mozart sheds new light on banknote fraud
|
|
|
1990 |
|
2 |
p. 3- 1 p. |
artikel |
128 |
NASA finds anti-nuclear worm
|
|
|
1989 |
|
2 |
p. 2- 1 p. |
artikel |
129 |
NCR symposium tackles open systems security issue
|
|
|
1988 |
|
2 |
p. 13-15 3 p. |
artikel |
130 |
Network Security Supplement
|
|
|
1987 |
|
2 |
p. 1- 1 p. |
artikel |
131 |
New government standard launch
|
|
|
1995 |
|
2 |
p. 5- 1 p. |
artikel |
132 |
New products
|
|
|
1991 |
|
2 |
p. 18-19 2 p. |
artikel |
133 |
New products
|
|
|
1992 |
|
2 |
p. 18- 1 p. |
artikel |
134 |
New version of Norton utilities launched
|
|
|
1988 |
|
2 |
p. 1-3 3 p. |
artikel |
135 |
New York hackers wreck voice mail system
|
|
|
1991 |
|
2 |
p. 1-2 2 p. |
artikel |
136 |
Nine steps to effective EDP loss control
|
|
|
1983 |
|
2 |
p. 7-11 5 p. |
artikel |
137 |
NRC urges formation of private US foundation
|
|
|
1991 |
|
2 |
p. 2- 1 p. |
artikel |
138 |
Nurse alters hospital prescriptions
|
|
|
1994 |
|
2 |
p. 4-5 2 p. |
artikel |
139 |
On-line strikes: Planning for industrial action
|
|
|
1979 |
|
2 |
p. 7-10 4 p. |
artikel |
140 |
On the heels of the ex-employee
|
English, Erin |
|
1995 |
|
2 |
p. 6-7 2 p. |
artikel |
141 |
Paris Bourse goes down
|
Gannon, Paul |
|
1993 |
|
2 |
p. 2- 1 p. |
artikel |
142 |
Password breaking
|
|
|
1981 |
|
2 |
p. 7-8 2 p. |
artikel |
143 |
PC access products: How good are they?
|
Rodgers, Allan |
|
1994 |
|
2 |
p. 10-13 4 p. |
artikel |
144 |
Pick of the bulletin board
|
|
|
1985 |
|
2 |
p. 1-15 15 p. |
artikel |
145 |
Planning ahead
|
Mansel, Ian |
|
1989 |
|
2 |
p. 12-15 4 p. |
artikel |
146 |
Playing to win
|
|
|
1980 |
|
2 |
p. 15-16 2 p. |
artikel |
147 |
Police on the ‘superhighway’
|
|
|
1995 |
|
2 |
p. 4- 1 p. |
artikel |
148 |
Prevention
|
|
|
1978 |
|
2 |
p. 15- 1 p. |
artikel |
149 |
Prevention and detection of computer fraud
|
|
|
1978 |
|
2 |
p. 2-3 2 p. |
artikel |
150 |
Prison sentences for ATM fraudsters
|
|
|
1994 |
|
2 |
p. 2- 1 p. |
artikel |
151 |
Program and data thefts
|
|
|
1980 |
|
2 |
p. 2-4 3 p. |
artikel |
152 |
Protecting information on local area network
|
Jackson, Keith |
|
1988 |
|
2 |
p. 18-19 2 p. |
artikel |
153 |
Quantum cryptography
|
|
|
1993 |
|
2 |
p. 4- 1 p. |
artikel |
154 |
Roles changed in downsized environment
|
|
|
1993 |
|
2 |
p. 3- 1 p. |
artikel |
155 |
Satellite-secrecy contract
|
|
|
1994 |
|
2 |
p. 3- 1 p. |
artikel |
156 |
Screwdriver in the works
|
|
|
1980 |
|
2 |
p. 4-6 3 p. |
artikel |
157 |
Second world conference on transborder data flow policies - Rome - 26–29 June 1984
|
|
|
1983 |
|
2 |
p. 12- 1 p. |
artikel |
158 |
Security moves to the forefront
|
|
|
1992 |
|
2 |
p. 5- 1 p. |
artikel |
159 |
Security pacific defrauded
|
|
|
1978 |
|
2 |
p. 11-12 2 p. |
artikel |
160 |
‘Security’ vs. profit?
|
|
|
1983 |
|
2 |
p. 3-6 4 p. |
artikel |
161 |
Selling IS to the employees
|
Peltier, ThomasR. |
|
1992 |
|
2 |
p. 10-17 8 p. |
artikel |
162 |
Small firms attacked by pirates
|
|
|
1980 |
|
2 |
p. 1-2 2 p. |
artikel |
163 |
So-called first UK computer crime
|
|
|
1982 |
|
2 |
p. 3-5 3 p. |
artikel |
164 |
Software licensing
|
Brown, Steve |
|
1994 |
|
2 |
p. 17-18 2 p. |
artikel |
165 |
Some are more secure than others
|
|
|
1980 |
|
2 |
p. 15- 1 p. |
artikel |
166 |
Some new directions
|
Shain, Mike |
|
1991 |
|
2 |
p. 7-17 11 p. |
artikel |
167 |
Sophos launches DESTEST and RSATEST
|
|
|
1988 |
|
2 |
p. 3- 1 p. |
artikel |
168 |
SPA reveals increase in cybercrime
|
|
|
1995 |
|
2 |
p. 3- 1 p. |
artikel |
169 |
State legislature computer spying revealed
|
Menkus, Belden |
|
1991 |
|
2 |
p. 4- 1 p. |
artikel |
170 |
Stop press
|
Armstrong, Lisa |
|
1995 |
|
2 |
p. 20- 1 p. |
artikel |
171 |
Stop press
|
|
|
1994 |
|
2 |
p. 20- 1 p. |
artikel |
172 |
Stop press
|
|
|
1990 |
|
2 |
p. 20- 1 p. |
artikel |
173 |
Stop press
|
|
|
1989 |
|
2 |
p. 20- 1 p. |
artikel |
174 |
Structured analysis
|
|
|
1980 |
|
2 |
p. 11-12 2 p. |
artikel |
175 |
Survey report
|
|
|
1978 |
|
2 |
p. 15-16 2 p. |
artikel |
176 |
Systems and data security
|
|
|
1978 |
|
2 |
p. 16-17 2 p. |
artikel |
177 |
Systems reliability and integrity
|
|
|
1978 |
|
2 |
p. 8-9 2 p. |
artikel |
178 |
Technical evaluation of SecretDisk
|
Jackson, Keith |
|
1987 |
|
2 |
p. 7-10 4 p. |
artikel |
179 |
The computer misuse act
|
Corbitt, Terry |
|
1994 |
|
2 |
p. 13-17 5 p. |
artikel |
180 |
The computer users forum
|
|
|
1990 |
|
2 |
p. 19- 1 p. |
artikel |
181 |
The implications of the SPANet hack
|
Jackson, Keith |
|
1987 |
|
2 |
p. 3-7 5 p. |
artikel |
182 |
The Italian hacker scene
|
Ongetta, Silvano |
|
1995 |
|
2 |
p. 7- 1 p. |
artikel |
183 |
The OZ Card is dead! - Long live the OZ Card!
|
|
|
1987 |
|
2 |
p. 13-14 2 p. |
artikel |
184 |
The PC security guide 1988/89
|
|
|
1988 |
|
2 |
p. 19-20 2 p. |
artikel |
185 |
The personnel side of computer security
|
Sommer, Peter |
|
1990 |
|
2 |
p. 13-15 3 p. |
artikel |
186 |
The SBA method for testing vulnerability to computer fraud
|
|
|
1984 |
|
2 |
p. 6-12 7 p. |
artikel |
187 |
Three little banking frauds
|
|
|
1981 |
|
2 |
p. 11-12 2 p. |
artikel |
188 |
Time share scam
|
|
|
1989 |
|
2 |
p. 2- 1 p. |
artikel |
189 |
Trade secrets for sale
|
|
|
1980 |
|
2 |
p. 10- 1 p. |
artikel |
190 |
UK foreign office fraud
|
|
|
1978 |
|
2 |
p. 18- 1 p. |
artikel |
191 |
UK government ministry fails audit
|
|
|
1992 |
|
2 |
p. 4- 1 p. |
artikel |
192 |
UK judge dismisses disk case
|
|
|
1991 |
|
2 |
p. 2- 1 p. |
artikel |
193 |
Underground advice
|
|
|
1981 |
|
2 |
p. 8-11 4 p. |
artikel |
194 |
Unsolicited goods
|
|
|
1978 |
|
2 |
p. 9- 1 p. |
artikel |
195 |
US computer security industry to double over next five years
|
|
|
1986 |
|
2 |
p. 15-16 2 p. |
artikel |
196 |
US firms risking computer disaster, say accountants
|
|
|
1987 |
|
2 |
p. 15-16 2 p. |
artikel |
197 |
US government board to create ‘new security order’
|
Madsen, Wayne |
|
1995 |
|
2 |
p. 8-9 2 p. |
artikel |
198 |
US pays dear for data loss
|
|
|
1993 |
|
2 |
p. 2- 1 p. |
artikel |
199 |
US toughens piracy laws
|
Klopp, Charlotte |
|
1993 |
|
2 |
p. 1-2 2 p. |
artikel |
200 |
Value added tax fraud
|
|
|
1978 |
|
2 |
p. 14- 1 p. |
artikel |
201 |
Viewpoint
|
Hinde, Stephen |
|
1993 |
|
2 |
p. 19-20 2 p. |
artikel |
202 |
Viewpoint
|
Gliss, Hans |
|
1991 |
|
2 |
p. 20- 1 p. |
artikel |
203 |
Virus bibliography compiled
|
|
|
1989 |
|
2 |
p. 3- 1 p. |
artikel |
204 |
Viruses infect Melbourne's Chisholm Institute
|
Rees, Frank |
|
1990 |
|
2 |
p. 4-5 2 p. |
artikel |
205 |
Washington case highlights call for new US computer
|
|
|
1987 |
|
2 |
p. 11-12 2 p. |
artikel |
206 |
What to look for
|
Solomon, Alan |
|
1993 |
|
2 |
p. 15-18 4 p. |
artikel |
207 |
When is a ‘delete’ not an ‘erase’?
|
Wong, Ken |
|
1988 |
|
2 |
p. 15-16 2 p. |
artikel |
208 |
Why are building societies so prone to fraud?
|
|
|
1978 |
|
2 |
p. 3-4 2 p. |
artikel |
209 |
Why victims will not talk
|
|
|
1978 |
|
2 |
p. 7-8 2 p. |
artikel |