Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             14 results found
no title author magazine year volume issue page(s) type
1 A fractured reaction to the Christmas bomber Fisher, Neil
2010
2010 2 p. 8-
1 p.
article
2 A new strategy for the protection of intellectual property Gupta, Meenu
2010
2010 2 p. 8-10
3 p.
article
3 Calendar 2010
2010 2 p. 20-
1 p.
article
4 Editorial 2010
2010 2 p. 3-
1 p.
article
5 Fraud 2009 bad, 2010 better? Gee, Jim
2010
2010 2 p. 13-15
3 p.
article
6 IE 8 reaches top browser slot 2010
2010 2 p. 3-
1 p.
article
7 In brief 2010
2010 2 p. 4-
1 p.
article
8 Software ownership: Where does it lie when it comes to M&A and outsourcing? Heap, Phil
2010
2010 2 p. 11-13
3 p.
article
9 The (in)consistent naming of malcode Kelchner, Tom
2010
2010 2 p. 5-7
3 p.
article
10 Three-dimensional incident management Goucher, Wendy
2010
2010 2 p. 16-17
2 p.
article
11 Top 25 software errors identified 2010
2010 2 p. 1-
1 p.
article
12 Trustwave: Businesses making same security mistakes 2010
2010 2 p. 2-
1 p.
article
13 UK police computer audit logging and control technology in the spotlight Ellsmore, Tim
2010
2010 2 p. 18-20
3 p.
article
14 US embarassed in cyberattack simulation 2010
2010 2 p. 2-
1 p.
article
                             14 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands