Record ID | harvard_bibliographic_metadata/ab.bib.00.20150123.full.mrc:325517944:1363 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.00.20150123.full.mrc:325517944:1363?format=raw |
LEADER: 01363cam a2200361 a 4500
001 000421618-0
005 20020606090541.3
008 890406s1985 enka b 00010 eng d
010 $agb 89035338
015 $aGB89-35338
020 $cNo price (pbk)
035 0 $aocm19669881
040 $aUKM$cUKM$dHLS
043 $ae-uk---
050 4 $aHV6773$b.K45 1985
082 04 $a364.1/63$219
090 $aH1.E26a$bx, no. 194
100 1 $aKelman, Alistair.
245 10 $aComputer fraud in small businesses :$bsecurity and auditability of business micro computers /$cby Alistair Kelman.
260 0 $aLondon, U.K. ;$aNew York, NY,USA :$bEconomist Intelligence Unit,$cc1985.
300 $a145 p. :$bill. ;$c30 cm.
490 0 $aSpecial report / the Economist Intelligence Unit ;$vno. 194
504 $aIncludes bibliographical references.
650 0 $aComputer crimes.
650 0 $aComputers$xAccess control.
650 0 $aCrime prevention.
650 0 $aSmall business$xData processing.
650 0 $aElectronic data processing departments$xSecurity measures.
710 2 $aEconomist Intelligence Unit (Great Britain)
776 08 $iOnline version:$aKelman, Alistair.$tComputer fraud in small businesses.$dLondon : Economist Intelligence Unit, ©1985$w(OCoLC)760636221
830 0 $aEIU special report ;$vno. 194.
988 $a20020608
906 $0OCLC