1. Editorial. Issue 7 (July 2015) Authors: Mansfield-Devine, Steve Journal: Computer fraud & security Issue: Issue 7(2017) Page Start: 2 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Editorial. (June 2015) Authors: Mansfield-Devine, Steve Journal: Computer fraud & security Issue: Number 6(2015) Page Start: 2 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Confusing terminology stunts the growth of cyber insurance. Issue 4 (April 2019) Authors: Hare-Brown, Neil Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 16 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. UK Finance: Fraud The Facts 2019. Issue 4 (April 2019) Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 4 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. In brief. Issue 4 (April 2019) Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 5 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Improving gender diversity: execs must demand better. Issue 4 (April 2019) Authors: Grunwitz, Kai Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 20 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. UK security programme criticised. Issue 4 (April 2019) Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 3 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Avoiding the weaknesses of a penetration test. Issue 4 (April 2019) Authors: Baiardi, Fabrizio Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 11 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Disrupting dark web supply chains to protect precious data. Issue 4 (April 2019) Authors: Wilson, Emily Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 6 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. How not to become a crypto-jacking statistic. Issue 4 (April 2019) Authors: Norman, James Journal: Computer fraud & security Issue: Issue 4(2019) Page Start: 18 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗