Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 An IT fairy tale Jessop, Gareth
1996
1996 6 p. 27-29
3 p.
article
2 Assumptions, perceptions and false reassurances Hinde, Stephen
1996
1996 6 p. 2-4
3 p.
article
3 Events 1996
1996 6 p. 32-
1 p.
article
4 Global initiative for business continuity 1996
1996 6 p. 6-
1 p.
article
5 Impostors, eavesdroppers and vandals 1996
1996 6 p. 30-31
2 p.
article
6 Information security design principles for adaptive organizations Lichtenstein, Sharman
1996
1996 6 p. 7-15
9 p.
article
7 Laptops: The new target of the cyber-criminal Bequai, August
1996
1996 6 p. 22-26
5 p.
article
8 Orion chipset found to contain second bug 1996
1996 6 p. 6-
1 p.
article
9 Scale of transition to year 2000 underestimated 1996
1996 6 p. 5-
1 p.
article
10 Survey reveals PC networks are Achilles' heel of UK businesses 1996
1996 6 p. 6-
1 p.
article
11 The systems development audit Nelms, Chris
1996
1996 6 p. 16-21
6 p.
article
12 Virus damages to top $5 billion 1996
1996 6 p. 5-
1 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands