no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An IT fairy tale
|
Jessop, Gareth |
|
1996 |
1996 |
6 |
p. 27-29 3 p. |
article |
2 |
Assumptions, perceptions and false reassurances
|
Hinde, Stephen |
|
1996 |
1996 |
6 |
p. 2-4 3 p. |
article |
3 |
Events
|
|
|
1996 |
1996 |
6 |
p. 32- 1 p. |
article |
4 |
Global initiative for business continuity
|
|
|
1996 |
1996 |
6 |
p. 6- 1 p. |
article |
5 |
Impostors, eavesdroppers and vandals
|
|
|
1996 |
1996 |
6 |
p. 30-31 2 p. |
article |
6 |
Information security design principles for adaptive organizations
|
Lichtenstein, Sharman |
|
1996 |
1996 |
6 |
p. 7-15 9 p. |
article |
7 |
Laptops: The new target of the cyber-criminal
|
Bequai, August |
|
1996 |
1996 |
6 |
p. 22-26 5 p. |
article |
8 |
Orion chipset found to contain second bug
|
|
|
1996 |
1996 |
6 |
p. 6- 1 p. |
article |
9 |
Scale of transition to year 2000 underestimated
|
|
|
1996 |
1996 |
6 |
p. 5- 1 p. |
article |
10 |
Survey reveals PC networks are Achilles' heel of UK businesses
|
|
|
1996 |
1996 |
6 |
p. 6- 1 p. |
article |
11 |
The systems development audit
|
Nelms, Chris |
|
1996 |
1996 |
6 |
p. 16-21 6 p. |
article |
12 |
Virus damages to top $5 billion
|
|
|
1996 |
1996 |
6 |
p. 5- 1 p. |
article |