Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             16 results found
no title author magazine year volume issue page(s) type
1 Analysis and Correlation Stephenson, Peter
2002
2002 12 p. 16-18
3 p.
article
2 Computer Fraud Scenarios Cohen, Fred
2002
2002 12 p. 5-6
2 p.
article
3 Crossing the Line or Making the Case? Boni, Bill
2002
2002 12 p. 18-20
3 p.
article
4 EC proposals to curtail corporate corruption 2002
2002 12 p. 3-
1 p.
article
5 Europol catch-up on cybercrime 2002
2002 12 p. 2-
1 p.
article
6 Events Calendar 2002
2002 12 p. 20-
1 p.
article
7 Former executive guilty of IP theft 2002
2002 12 p. 3-
1 p.
article
8 Industry war over online authentication Hunter, Philip
2002
2002 12 p. 1-2
2 p.
article
9 Nowhere to Hide Dwan, Berni
2002
2002 12 p. 13-15
3 p.
article
10 Print, Sign and Submit Wilding, Edward
2002
2002 12 p. 4-5
2 p.
article
11 Risk Assessment for Dummies Mash, Steve
2002
2002 12 p. 11-13
3 p.
article
12 Role-Based Access Control — a Real World Solution Betteridge, Philip
2002
2002 12 p. 9-11
3 p.
article
13 Securities firms fined for deleting emails 2002
2002 12 p. 3-
1 p.
article
14 UK bank turn to biometrics to cut fraud 2002
2002 12 p. 2-3
2 p.
article
15 UK hacker charged with computer fraud 2002
2002 12 p. 3-
1 p.
article
16 Your Money or your Website? Wales, Elspeth
2002
2002 12 p. 7-8
2 p.
article
                             16 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands