Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Mohsen Attaran
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Managing legal liability of the Net: a ten step guide for IT managers
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2000) 8 (2): 98–100.
Published: 01 May 2000
Journal Articles
Voice recognition software programs: are they right for you?
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2000) 8 (1): 42–44.
Published: 01 March 2000
Journal Articles
Privacy and security on the Internet: how to secure your personal information and company data
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1999) 7 (5): 241–247.
Published: 01 December 1999
Journal Articles
Internet‐based business opportunities: buyers beware of scams
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1999) 7 (4): 176–178.
Published: 01 October 1999
