-
3
-
-
5844393611
-
Dial F for Fraud
-
7 March
-
Computing (1996), "Dial F for Fraud", Computing, 7 March.
-
(1996)
Computing
-
-
-
5
-
-
5844331504
-
Computer crime: Interpreting violation of safeguards by trusted personnel
-
Khosrowpour, M. (Ed), Idea Group Publishing, Hershey
-
Dhillon, G. (1999), "Computer crime: interpreting violation of safeguards by trusted personnel", in Khosrowpour, M. (Ed), Managing Information Technology Resources in Organizations in the Next Millennium, Idea Group Publishing, Hershey, pp. 602-6.
-
(1999)
Managing Information Technology Resources in Organizations in the next Millennium
, pp. 602-606
-
-
Dhillon, G.1
-
7
-
-
5844402139
-
4 accused in high-tech gas pump scam
-
9 October
-
Ismael, K. (1998), "4 accused in high-tech gas pump scam", Los Angeles Times, 9 October.
-
(1998)
Los Angeles Times
-
-
Ismael, K.1
-
8
-
-
0042565724
-
Local area network operations: A security, control and audit perspective
-
Jamieson, R. and Low, G. (1990), "Local area network operations: a security, control and audit perspective", Journal of Information Technology, Vol. 5, pp. 63-2.
-
(1990)
Journal of Information Technology
, vol.5
, pp. 63-72
-
-
Jamieson, R.1
Low, G.2
-
9
-
-
5844419589
-
Scots health records at risk following CSC systems fiasco
-
25 July
-
Jones, R. (1996), "Scots health records at risk following CSC systems fiasco", Computing, 25 July, p. 1.
-
(1996)
Computing
, pp. 1
-
-
Jones, R.1
-
10
-
-
5844402421
-
The enemy within
-
15 June
-
Knowles, A. (1996), "The enemy within", CIO Magazine, 15 June.
-
(1996)
CIO Magazine
-
-
Knowles, A.1
-
11
-
-
5844402337
-
Threat to corporate computers is often enemy within
-
2 March
-
Lewis, P. (1998), "Threat to corporate computers is often enemy within", New York Times, 2 March.
-
(1998)
New York Times
-
-
Lewis, P.1
-
12
-
-
84937311421
-
Wiseguys: Smarter criminals and smarter crime in the 21st century
-
Moore, R.H. Jr (1994), "Wiseguys: smarter criminals and smarter crime in the 21st century", Futurist, Vol. 28 No. 5, pp. 33-7.
-
(1994)
Futurist
, vol.28
, Issue.5
, pp. 33-37
-
-
Moore Jr., R.H.1
-
13
-
-
5844374508
-
A treatise on hacker-busting
-
Open Computing (1995), "A treatise on hacker-busting", Open Computing, May, p. 104.
-
(1995)
Open Computing
, vol.MAY
, pp. 104
-
-
-
14
-
-
0007473365
-
Seventeen information security myths debunked
-
Dittrich, K. et al. (Eds), Elsevier Science Publishers, Amsterdam
-
Parker, D. (1991), "Seventeen information security myths debunked", in Dittrich, K. et al. (Eds), Computer Security and Information Integrity, Elsevier Science Publishers, Amsterdam, pp. 363-70.
-
(1991)
Computer Security and Information Integrity
, pp. 363-370
-
-
Parker, D.1
-
16
-
-
5844421389
-
Asean - Computer Crime and Corrective Action: A Status Report
-
Gable, G.G. and Caelli, W.J. (Eds) Singapore, 27-29 May, Elsevier Science Publishers B.V., North Holland, Amsterdam
-
Soon, C.T. (1992), Asean - Computer Crime and Corrective Action: A Status Report, Eighth IFIP International Symposium on Computer Security, IFIP Sec'92, Gable, G.G. and Caelli, W.J. (Eds) Singapore, 27-29 May, Elsevier Science Publishers B.V., North Holland, Amsterdam, pp. 23-33.
-
(1992)
Eighth IFIP International Symposium on Computer Security, IFIP Sec'92
, pp. 23-33
-
-
Soon, C.T.1
-
17
-
-
5844402140
-
The high price of insecurity
-
21 April
-
Yazel, L. (1994), "The high price of insecurity", Computing, 21 April, p. 23.
-
(1994)
Computing
, pp. 23
-
-
Yazel, L.1
|