nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A legal overview of phishing
|
Granova, Anna |
|
2005 |
2005 |
7 |
p. 6-11 6 p. |
artikel |
2 |
Banks move towards two-factor authentication
|
|
|
2005 |
2005 |
7 |
p. 20- 1 p. |
artikel |
3 |
Beyond disaster recovery: the benefits of business continuity
|
Stanton, Ray |
|
2005 |
2005 |
7 |
p. 18-19 2 p. |
artikel |
4 |
Continuous auditing: verifying information integrity and providing assurances for financial reports
|
Flowerday, Stephen |
|
2005 |
2005 |
7 |
p. 12-16 5 p. |
artikel |
5 |
Events calendar
|
|
|
2005 |
2005 |
7 |
p. 20- 1 p. |
artikel |
6 |
In brief
|
|
|
2005 |
2005 |
7 |
p. 3- 1 p. |
artikel |
7 |
Knowledge is power: protecting privacy
|
Hinde, Stephen |
|
2005 |
2005 |
7 |
p. 16-17 2 p. |
artikel |
8 |
London terrorist attacks heat up identity card debate and highlight uncertainties over their efficacy
|
Hunter, Philip |
|
2005 |
2005 |
7 |
p. 4-5 2 p. |
artikel |
9 |
LSE calls for decentralised UK ID
|
Mathieson, SA |
|
2005 |
2005 |
7 |
p. 2- 1 p. |
artikel |
10 |
Police appeal for more Internet powers
|
|
|
2005 |
2005 |
7 |
p. 1- 1 p. |
artikel |
11 |
Sarbanes Oxley - dangerous distraction, shows research
|
|
|
2005 |
2005 |
7 |
p. 3- 1 p. |
artikel |
12 |
UK seeks all-EU traffic data retention
|
Mathieson, SA |
|
2005 |
2005 |
7 |
p. 1-2 2 p. |
artikel |