Found: 30

Select item for more details and to access through your institution.

  • Barefoot Computing Project.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 4, doi. 10.1093/itnow/bwv001
    Publication type:
    Article
  • Alchemy Bringing Members Volunteers and Staff Together.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 6, doi. 10.1093/itnow/bwv002
    By:
    • Fletcher, Paul
    Publication type:
    Article
  • Data Retention Wrangles.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 8, doi. 10.1093/itnow/bwv003
    By:
    • Walker-Osborn, Charlotte
    Publication type:
    Article
  • Data Collection Dangers.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 10, doi. 10.1093/itnow/bwv004
    By:
    • Smith, Andy
    Publication type:
    Article
  • Risk Assessment.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 14, doi. 10.1093/itnow/bwv005
    By:
    • Mitchell, John
    Publication type:
    Article
  • Dude Where's My Data?

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 16, doi. 10.1093/itnow/bwv006
    By:
    • Quayle, John
    Publication type:
    Article
  • Cloud With a Chance of Regulation.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 18, doi. 10.1093/itnow/bwv007
    By:
    • Meachem, Stephen
    Publication type:
    Article
  • Lessons Learned.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 22, doi. 10.1093/itnow/bwv008
    By:
    • Niblett, Gareth
    Publication type:
    Article
  • Expert Guidance.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 24, doi. 10.1093/itnow/bwv009
    By:
    • Smith, Andy
    Publication type:
    Article
  • Secure Development.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 26, doi. 10.1093/itnow/bwv010
    By:
    • Daniels, Steve
    Publication type:
    Article
  • Paying the Price.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 28, doi. 10.1093/itnow/bwv011
    By:
    • Pritchard, Rob
    Publication type:
    Article
  • Persistent Threats.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 30, doi. 10.1093/itnow/bwv012
    By:
    • Batchellor, Valory;
    • Warburton, Neil
    Publication type:
    Article
  • Maintain Integrity.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 32, doi. 10.1093/itnow/bwv013
    By:
    • Mitchell, John
    Publication type:
    Article
  • How Secure is Secure?

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 34, doi. 10.1093/itnow/bwv014
    By:
    • Baxendale, Gareth
    Publication type:
    Article
  • Someone is Watching You.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 36, doi. 10.1093/itnow/bwv015
    By:
    • Oatridge, Nic
    Publication type:
    Article
  • Securing Digital Transactions.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 38, doi. 10.1093/itnow/bwv016
    By:
    • Grant, Alex
    Publication type:
    Article
  • The Security Balancing Act.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 40, doi. 10.1093/itnow/bwv017
    By:
    • Titterington, Graham
    Publication type:
    Article
  • Development and Mentoring.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 42, doi. 10.1093/itnow/bwv018
    By:
    • Dann, Jill
    Publication type:
    Article
  • Technology Meets Tradition.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 44, doi. 10.1093/itnow/bwv019
    By:
    • Jagger, Paul D
    Publication type:
    Article
  • Introduction to BCS Health.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 46, doi. 10.1093/itnow/bwv020
    By:
    • Baxendale, Gareth
    Publication type:
    Article
  • Email Archiving and Health.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 47, doi. 10.1093/itnow/bwv021
    By:
    • Freeman, Mike
    Publication type:
    Article
  • Manifestos Making the UK the IT Place to Be.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 48, doi. 10.1093/itnow/bwv022
    By:
    • Runciman, Brian
    Publication type:
    Article
  • Drive-By Computing.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 52, doi. 10.1093/itnow/bwv023
    By:
    • Tucker, Henry
    Publication type:
    Article
  • The Accessibility Bunfight.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 54, doi. 10.1093/itnow/bwv024
    By:
    • Leicester, Howard
    Publication type:
    Article
  • State of Play Report Business Intelligence.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 56, doi. 10.1093/itnow/bwv025
    By:
    • Runciman, Brian
    Publication type:
    Article
  • What Digital Leaders Want and Need.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 58, doi. 10.1093/itnow/bwv026
    By:
    • Runciman, Brian
    Publication type:
    Article
  • Gamification and Projects.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 62, doi. 10.1093/itnow/bwv027
    Publication type:
    Article
  • Free Wilkes Award Papers.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 63, doi. 10.1093/itnow/bwv028
    Publication type:
    Article
  • The Computer Journal.

    Published in:
    ITNOW, 2015, v. 57, n. 1, p. 64, doi. 10.1093/itnow/bwv029
    By:
    • Murtagh, Fionn
    Publication type:
    Article
  • Left of the Inside Back Cover.

    Published in:
    2015
    By:
    • Runciman, Brian
    Publication type:
    Proceeding