Works matching IS 17465702 AND DT 2015 AND VI 57 AND IP 1


Results: 30
    1
    2

    Technology Meets Tradition.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 44, doi. 10.1093/itnow/bwv019
    By:
    • Jagger, Paul D
    Publication type:
    Article
    3

    The Computer Journal.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 64, doi. 10.1093/itnow/bwv029
    By:
    • Murtagh, Fionn
    Publication type:
    Article
    4
    5

    Drive-By Computing.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 52, doi. 10.1093/itnow/bwv023
    By:
    • Tucker, Henry
    Publication type:
    Article
    6
    7

    Expert Guidance.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 24, doi. 10.1093/itnow/bwv009
    By:
    • Smith, Andy
    Publication type:
    Article
    8

    Someone is Watching You.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 36, doi. 10.1093/itnow/bwv015
    By:
    • Oatridge, Nic
    Publication type:
    Article
    9

    Email Archiving and Health.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 47, doi. 10.1093/itnow/bwv021
    By:
    • Freeman, Mike
    Publication type:
    Article
    10

    Lessons Learned.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 22, doi. 10.1093/itnow/bwv008
    By:
    • Niblett, Gareth
    Publication type:
    Article
    11

    Persistent Threats.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 30, doi. 10.1093/itnow/bwv012
    By:
    • Batchellor, Valory;
    • Warburton, Neil
    Publication type:
    Article
    12

    Introduction to BCS Health.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 46, doi. 10.1093/itnow/bwv020
    By:
    • Baxendale, Gareth
    Publication type:
    Article
    13

    Development and Mentoring.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 42, doi. 10.1093/itnow/bwv018
    By:
    • Dann, Jill
    Publication type:
    Article
    14
    15

    The Accessibility Bunfight.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 54, doi. 10.1093/itnow/bwv024
    By:
    • Leicester, Howard
    Publication type:
    Article
    16
    17

    Risk Assessment.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 14, doi. 10.1093/itnow/bwv005
    By:
    • Mitchell, John
    Publication type:
    Article
    18

    Paying the Price.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 28, doi. 10.1093/itnow/bwv011
    By:
    • Pritchard, Rob
    Publication type:
    Article
    19

    Dude Where's My Data?

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 16, doi. 10.1093/itnow/bwv006
    By:
    • Quayle, John
    Publication type:
    Article
    20
    21

    The Security Balancing Act.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 40, doi. 10.1093/itnow/bwv017
    By:
    • Titterington, Graham
    Publication type:
    Article
    22
    23

    Maintain Integrity.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 32, doi. 10.1093/itnow/bwv013
    By:
    • Mitchell, John
    Publication type:
    Article
    24

    Data Collection Dangers.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 10, doi. 10.1093/itnow/bwv004
    By:
    • Smith, Andy
    Publication type:
    Article
    25
    26

    Secure Development.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 26, doi. 10.1093/itnow/bwv010
    By:
    • Daniels, Steve
    Publication type:
    Article
    27
    28

    How Secure is Secure?

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 34, doi. 10.1093/itnow/bwv014
    By:
    • Baxendale, Gareth
    Publication type:
    Article
    29

    Data Retention Wrangles.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 8, doi. 10.1093/itnow/bwv003
    By:
    • Walker-Osborn, Charlotte
    Publication type:
    Article
    30