Works matching IS 17465702 AND DT 2015 AND VI 57 AND IP 1


Results: 30
    • Alchemy Bringing Members Volunteers and Staff Together.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 6, doi. 10.1093/itnow/bwv002
      By:
      • Fletcher, Paul
      Publication type:
      Article
    • Technology Meets Tradition.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 44, doi. 10.1093/itnow/bwv019
      By:
      • Jagger, Paul D
      Publication type:
      Article
    • The Computer Journal.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 64, doi. 10.1093/itnow/bwv029
      By:
      • Murtagh, Fionn
      Publication type:
      Article
    • Manifestos Making the UK the IT Place to Be.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 48, doi. 10.1093/itnow/bwv022
      By:
      • Runciman, Brian
      Publication type:
      Article
    • Drive-By Computing.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 52, doi. 10.1093/itnow/bwv023
      By:
      • Tucker, Henry
      Publication type:
      Article
    • Cloud With a Chance of Regulation.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 18, doi. 10.1093/itnow/bwv007
      By:
      • Meachem, Stephen
      Publication type:
      Article
    • Expert Guidance.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 24, doi. 10.1093/itnow/bwv009
      By:
      • Smith, Andy
      Publication type:
      Article
    • Someone is Watching You.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 36, doi. 10.1093/itnow/bwv015
      By:
      • Oatridge, Nic
      Publication type:
      Article
    • Email Archiving and Health.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 47, doi. 10.1093/itnow/bwv021
      By:
      • Freeman, Mike
      Publication type:
      Article
    • Lessons Learned.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 22, doi. 10.1093/itnow/bwv008
      By:
      • Niblett, Gareth
      Publication type:
      Article
    • Persistent Threats.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 30, doi. 10.1093/itnow/bwv012
      By:
      • Batchellor, Valory;
      • Warburton, Neil
      Publication type:
      Article
    • Introduction to BCS Health.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 46, doi. 10.1093/itnow/bwv020
      By:
      • Baxendale, Gareth
      Publication type:
      Article
    • Development and Mentoring.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 42, doi. 10.1093/itnow/bwv018
      By:
      • Dann, Jill
      Publication type:
      Article
    • Securing Digital Transactions.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 38, doi. 10.1093/itnow/bwv016
      By:
      • Grant, Alex
      Publication type:
      Article
    • The Accessibility Bunfight.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 54, doi. 10.1093/itnow/bwv024
      By:
      • Leicester, Howard
      Publication type:
      Article
    • What Digital Leaders Want and Need.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 58, doi. 10.1093/itnow/bwv026
      By:
      • Runciman, Brian
      Publication type:
      Article
    • Risk Assessment.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 14, doi. 10.1093/itnow/bwv005
      By:
      • Mitchell, John
      Publication type:
      Article
    • Paying the Price.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 28, doi. 10.1093/itnow/bwv011
      By:
      • Pritchard, Rob
      Publication type:
      Article
    • Dude Where's My Data?

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 16, doi. 10.1093/itnow/bwv006
      By:
      • Quayle, John
      Publication type:
      Article
    • Barefoot Computing Project.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 4, doi. 10.1093/itnow/bwv001
      Publication type:
      Article
    • The Security Balancing Act.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 40, doi. 10.1093/itnow/bwv017
      By:
      • Titterington, Graham
      Publication type:
      Article
    • State of Play Report Business Intelligence.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 56, doi. 10.1093/itnow/bwv025
      By:
      • Runciman, Brian
      Publication type:
      Article
    • Maintain Integrity.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 32, doi. 10.1093/itnow/bwv013
      By:
      • Mitchell, John
      Publication type:
      Article
    • Data Collection Dangers.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 10, doi. 10.1093/itnow/bwv004
      By:
      • Smith, Andy
      Publication type:
      Article
    • Free Wilkes Award Papers.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 63, doi. 10.1093/itnow/bwv028
      Publication type:
      Article
    • Secure Development.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 26, doi. 10.1093/itnow/bwv010
      By:
      • Daniels, Steve
      Publication type:
      Article
    • Gamification and Projects.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 62, doi. 10.1093/itnow/bwv027
      Publication type:
      Article
    • How Secure is Secure?

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 34, doi. 10.1093/itnow/bwv014
      By:
      • Baxendale, Gareth
      Publication type:
      Article
    • Data Retention Wrangles.

      Published in:
      ITNOW, 2015, v. 57, n. 1, p. 8, doi. 10.1093/itnow/bwv003
      By:
      • Walker-Osborn, Charlotte
      Publication type:
      Article
    • Left of the Inside Back Cover.

      Published in:
      2015
      By:
      • Runciman, Brian
      Publication type:
      Proceeding