Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("banking data")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 17 of 17

  • Page / 1
Export

Selection :

  • and

Arrêté relatif au traitement automatisé des informations sur la régularité des chèques mis en œuvre par la Banque de France1992, pp 10669-10670Report

Jugement du tribunal de grande instance de Paris du 25 mars 1992: J. L. A. c. La Banque de France1992, pp 313-316Book

Dépitée mais déterminée: la CNIL et son rendez-vous 93MARTIN, D.Expertises. 1992, Num 152, pp 259-261Article

Dematerialisation of financial instrumentsCHALTON, S.Special issue. Electronic Banking. Computer Law and Practice. 1990, Vol 7, Num 1, pp 30-34Book Chapter

Contrats and Liabilities in Electronic BankingKARAGEORGIOU, S.Special issue. Electronic Banking. Computer Law and Practice. 1990, Vol 7, Num 1, pp 42-43Book Chapter

EC Commission proposals on data protection: continuing threat to financial transactionsSCHAUSS, M; BERKVENS, J.Computer Law and Practice. 1992, Vol 8, Num 4, pp 98-104Article

Limitation of liability in EFT transactionsROBERTSON, R.Special issue. Electronic Banking. Computer Law and Practice. 1990, Vol 7, Num 1, pp 18-23Book Chapter

Electronic funds transfers at point of sale in the USALONGE, O.Special issue. Electronic Banking. Computer Law and Practice. 1990, Vol 7, Num 1, pp 24-29Book Chapter

L'homonymie est une atteinte à la sécurité de l'information (article 29 de la loi informatique, fichiers et libertés) = Homonymy is an attack on the information security (article 29, Computer , files and liberties law)FRAYSSINET, J.Expertises des systèmes d'information. 1994, Num 173, pp 229-231, issn 0221-2102Article

Communications and Information in Global Financial Service IndustriesGANLEY, O. H.Transnational Data Report. 1992, Vol 15, Num 5, pp 25-30Article

Toronto statement on the international legal vulnerability of financial informationKIRBY, M.Computer/Law Journal. 1991, Vol 11, Num 1, pp 75-96Article

Network providersPETRE, B.Special issue. Electronic Banking. Computer Law and Practice. 1990, Vol 7, Num 1, pp 8-18Book Chapter

Sampling strategies for targeting rare groups from a bank customer databaseCHAUCHAT, J-H; RAKOTOMALALA, R; ROBERT, D et al.Lecture notes in computer science. 2000, pp 181-190, issn 0302-9743, isbn 3-540-41066-XConference Paper

Target group selection in retail banking through Neuro-Fuzzy Data mining and extensive pre- and postprocessingWITTMANN, T; RUHLAND, J.Lecture notes in computer science. 1999, pp 359-368, issn 0302-9743, isbn 3-540-66458-0Conference Paper

m-Order - Payment Model via SMS within the m-BankingDUKIC, Branimir; KATIC, Miroslav.Information technology interfaces. 2005, pp 99-104, isbn 953-7138-02-X, 1Vol, 6 p.Conference Paper

Strategies to meet business demandsTHORNTON-SMITH, David.ERA Report. 1999, pp 6.1.1-6.1.10, isbn 0-7008-0693-8Conference Paper

Quality and security of supply in electrical networks (London, 16-17 February 1999)Pittman, S.V.ERA Report. 1999, isbn 0-7008-0693-8, 290 p., isbn 0-7008-0693-8Conference Proceedings

  • Page / 1