Works matching IS 17465702 AND DT 2012 AND VI 54 AND IP 1


Results: 29
    1
    2

    Breaking into Security.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 18, doi. 10.1093/itnow/bws006
    By:
    • Westmacott, Mike
    Publication type:
    Article
    3

    More Chiefs Required.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 30, doi. 10.1093/itnow/bws012
    By:
    • Whatling, Justin
    Publication type:
    Article
    4

    Its - The Hidden Service.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 56, doi. 10.1093/itnow/bws023
    By:
    • Welsh, Paul
    Publication type:
    Article
    5

    Policy Hub.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 4
    Publication type:
    Article
    6
    7
    8

    Protecting the Nation's Wealth.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 16, doi. 10.1093/itnow/bws005
    By:
    • Neville-Jones, Baroness;
    • Ensor, Chris;
    • Westmacott, Mike
    Publication type:
    Article
    9

    Understanding Jane.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 50, doi. 10.1093/itnow/bws019
    By:
    • Terras, Melissa
    Publication type:
    Article
    10
    11

    Cyber Security Strategy.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 10, doi. 10.1093/itnow/bws003
    By:
    • Bennett, Louise
    Publication type:
    Article
    12

    Opinion: Going Soft?

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 35, doi. 10.1093/itnow/bws013
    By:
    • Atkins, Jooli
    Publication type:
    Article
    13

    Don't Blame Home Users.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 20, doi. 10.1093/itnow/bws007
    By:
    • Rowlingson, Robert
    Publication type:
    Article
    14
    15
    16

    Power to the People?

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 46, doi. 10.1093/itnow/bws018
    By:
    • Samuels, Mark
    Publication type:
    Article
    17
    18

    Password P R O 8 L 3 M $.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 21, doi. 10.1093/itnow/bws008
    By:
    • Mitchell, John
    Publication type:
    Article
    19
    20
    21

    Threats and Countermeasures.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 6, doi. 10.1093/itnow/bws002
    By:
    • Niblett, Gareth
    Publication type:
    Article
    22

    Court Social.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 54, doi. 10.1093/itnow/bws021
    By:
    • Burnett, Rachel
    Publication type:
    Article
    23

    Britain's Got Talent.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 64, doi. 10.1093/itnow/bws027
    By:
    • Brazier, John
    Publication type:
    Article
    24

    To Serve and Protect.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
    By:
    • Walker-Osborn, Charlotte;
    • Harto, Nadia
    Publication type:
    Article
    25

    A Problem with Perception.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 36, doi. 10.1093/itnow/bws014
    By:
    • McGlinchey, John
    Publication type:
    Article
    26

    On the Move.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 55, doi. 10.1093/itnow/bws022
    By:
    • Tucker, Henry
    Publication type:
    Article
    27
    28

    Solution or Distraction?

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 27, doi. 10.1093/itnow/bws011
    By:
    • Swindells, Matthew
    Publication type:
    Article
    29

    The Computer Journal.

    Published in:
    ITNOW, 2012, v. 54, n. 1, p. 59, doi. 10.1093/itnow/bws024
    Publication type:
    Article