Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 A legal overview of phishing Granova, Anna
2005
2005 7 p. 6-11
6 p.
article
2 Banks move towards two-factor authentication 2005
2005 7 p. 20-
1 p.
article
3 Beyond disaster recovery: the benefits of business continuity Stanton, Ray
2005
2005 7 p. 18-19
2 p.
article
4 Continuous auditing: verifying information integrity and providing assurances for financial reports Flowerday, Stephen
2005
2005 7 p. 12-16
5 p.
article
5 Events calendar 2005
2005 7 p. 20-
1 p.
article
6 In brief 2005
2005 7 p. 3-
1 p.
article
7 Knowledge is power: protecting privacy Hinde, Stephen
2005
2005 7 p. 16-17
2 p.
article
8 London terrorist attacks heat up identity card debate and highlight uncertainties over their efficacy Hunter, Philip
2005
2005 7 p. 4-5
2 p.
article
9 LSE calls for decentralised UK ID Mathieson, SA
2005
2005 7 p. 2-
1 p.
article
10 Police appeal for more Internet powers 2005
2005 7 p. 1-
1 p.
article
11 Sarbanes Oxley - dangerous distraction, shows research 2005
2005 7 p. 3-
1 p.
article
12 UK seeks all-EU traffic data retention Mathieson, SA
2005
2005 7 p. 1-2
2 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands