nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Applying forensic techniques to information system risk management – first steps
|
Stephenson, Peter |
|
2003 |
2003 |
12 |
p. 17-19 3 p. |
artikel |
2 |
Electronic funds transfer fraud
|
Henderson, Ian |
|
2003 |
2003 |
12 |
p. 6-9 4 p. |
artikel |
3 |
Events calendar
|
|
|
2003 |
2003 |
12 |
p. 20- 1 p. |
artikel |
4 |
Hackers as terrorists? why it doesn't compute
|
Conway, Maura |
|
2003 |
2003 |
12 |
p. 10-13 4 p. |
artikel |
5 |
In brief
|
|
|
2003 |
2003 |
12 |
p. 2-3 2 p. |
artikel |
6 |
In brief/events
|
|
|
2003 |
2003 |
12 |
p. 20- 1 p. |
artikel |
7 |
Internal response teams versus external consultants - a decision matrix
|
Wilding, Edward |
|
2003 |
2003 |
12 |
p. 4-5 2 p. |
artikel |
8 |
P-P-preventing the P-P-panic during incident response1
|
Pemble, Matthew |
|
2003 |
2003 |
12 |
p. 14-16 3 p. |
artikel |
9 |
UK bank fraud gang busted
|
Everett, Catherine |
|
2003 |
2003 |
12 |
p. 1-2 2 p. |
artikel |
10 |
125 US arrests in online fraud swoop
|
|
|
2003 |
2003 |
12 |
p. 3- 1 p. |
artikel |
11 |
Virus writers
|
|
|
2003 |
2003 |
12 |
p. 1-3 3 p. |
artikel |