nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Boxing Clever
|
|
|
2002 |
2002 |
11 |
p. 4-6 3 p. |
artikel |
2 |
Breaking the Bank
|
|
|
2002 |
2002 |
11 |
p. 12-14 3 p. |
artikel |
3 |
Collecting Evidence of a Computer Crime
|
|
|
2002 |
2002 |
11 |
p. 17-19 3 p. |
artikel |
4 |
Companies turn detectives
|
|
|
2002 |
2002 |
11 |
p. 1-2 2 p. |
artikel |
5 |
Computer Forensics — the Morse or Clouseau Approach?
|
|
|
2002 |
2002 |
11 |
p. 14-17 4 p. |
artikel |
6 |
Events Calendar
|
|
|
2002 |
2002 |
11 |
p. 20- 1 p. |
artikel |
7 |
Fictional Accounting
|
|
|
2002 |
2002 |
11 |
p. 6-8 3 p. |
artikel |
8 |
Hoax email captures Yahoo’s customer credit numbers
|
|
|
2002 |
2002 |
11 |
p. 3- 1 p. |
artikel |
9 |
Instant Messaging — an Instant Threat
|
|
|
2002 |
2002 |
11 |
p. 19-20 2 p. |
artikel |
10 |
Nigerian fraud scheme fakes bank websites
|
|
|
2002 |
2002 |
11 |
p. 3- 1 p. |
artikel |
11 |
Options in Computer Forensic Tools
|
|
|
2002 |
2002 |
11 |
p. 8-11 4 p. |
artikel |
12 |
PKI — revelation of key problems
|
|
|
2002 |
2002 |
11 |
p. 2-3 2 p. |
artikel |
13 |
Web services — hesitations in US
|
|
|
2002 |
2002 |
11 |
p. 3- 1 p. |
artikel |