Bank clerk charged with attempting 70 million heist (English)
In:
COMPUTER FRAUD AND SECURITY
;
2008
, 6
;
3
;
2008
-
ISSN:
- Article (Journal) / Print
-
Title:Bank clerk charged with attempting 70 million heist
-
Published in:COMPUTER FRAUD AND SECURITY ; 2008, 6 ; 3
-
Publisher:
- New search for: Elsevier Science B.V., Amsterdam.
-
Publication date:2008-01-01
-
Size:3 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.8 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 2008, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Woman accused of bullying teen on MySpace| 2008
- 2
-
UK universities neglect IT security teaching: survey| 2008
- 2
-
Consumers told: take care of bank info or be liable for fraud| 2008
- 2
-
EditorialHilley, Sarah et al. | 2008
- 3
-
Purdue University research output rated best in US| 2008
- 3
-
Hackers post flashing images to cause epileptic fits| 2008
- 3
-
Bank clerk charged with attempting £70 million heist| 2008
- 3
-
Serious data protection breaches to be heavily fined in UK| 2008
- 4
-
UK shadow home secretary victim of online card fraudHunter, Philip et al. | 2008
- 5
-
Data protection: why are organisations still missing the point?Gorge, Mathieu et al. | 2008
- 9
-
The best laid schemes of mice and information security consultantsGoucher, Wendy et al. | 2008
- 9
-
The best laid schemes of mice and information security consultants1 Based on a quote from Robert Burns: “The best-laid schemes o' mice an men”Goucher, Wendy et al. | 2008
- 11
-
Should search engines protect you against malicious sites?Hunter, Philip et al. | 2008
- 13
-
Passwords vs post-it notesGoucher, Wendy et al. | 2008
- 14
-
Protecting cardholder data with encryptionMoulds, Richard et al. | 2008
- 15
-
The changing nature of malicious attacksJones, Andy et al. | 2008
- 17
-
Now for the good news – scientists and educators are keeping the flame aliveForte, Dario / Power, Richard et al. | 2008
- 20
-
Calendar| 2008