Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ct.\*:("Information and communication technologies")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 7740

  • Page / 310
Export

Selection :

  • and

Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article

Droit: le référentiel général de sécuritéTHOMAS, Michel.Archimag (Vincennes). 2012, Num 257, pp 36-37, issn 0769-0975, 2 p.Article

Planning the Taiwan Access Management Federation based on ShibbolethNAICHENG CHANG; LIMEI CHEN; HOPKINSON, Alan et al.Libri (Copenhagen). 2011, Vol 61, Num 2, pp 154-164, issn 0024-2667, 11 p.Article

GESTIÓN EFICIENTE DEL CORREO ELECTRÓNICO: UNA EXPERIENCIA CORPORATIVA : Tema central: Inteligencia competitiva = Efficient management of electronic mail: a corporate case studySAINZ-ALOY, Anna; SOY-AUMATELL, Cristina.El Profesional de la información. 2011, Vol 20, Num 5, pp 571-576, issn 1386-6710, 6 p.Article

Protect your library's computersZIMERMAN, Martin.New library world. 2010, Vol 111, Num 1272-3, pp 203-212, issn 0307-4803, 10 p.Article

The Future of Mobile Communications New Communication Methods to Preserve Revenue GrowthCARBONNE, Pierre; NAKAJIMA, Soichi.Communications & stratégies (Montpellier). 2009, Num 75, pp 133-138, issn 1157-8637, 6 p.Article

Sociotechnical Interaction and Cyborg―Cyborg Interaction: Transforming the Scale and Convergence of HClFLEISCHMANN, Kenneth R.The Information society. 2009, Vol 25, Num 4, pp 227-235, issn 0197-2243, 9 p.Article

Testing the Off-Site Experience, or, How Well Do You Proxy?RIBARIC, Tim J.Computers in libraries. 2009, Vol 29, Num 1, pp 18-21, issn 1041-7915, 4 p.Article

Creating Safe, Collaborative Cultures in a Web 2.0 WorldMCCLURE, Marji.EContent (Wilton, Conn.). 2009, Vol 32, Num 5, issn 1525-2531, 3, 22-26 [6 p.]Article

The information security policy unpacked: A critical study of the content of university policiesDOHERTY, Neil Francis; ANASTASAKIS, Leonidas; FULFORD, Heather et al.International journal of information management. 2009, Vol 29, Num 6, pp 449-457, issn 0268-4012, 9 p.Article

Reorienting the Mobile : Australasian ImaginariesGOGGIN, Gerard.The Information society. 2008, Vol 24, Num 3, pp 171-181, issn 0197-2243, 11 p.Conference Paper

Risky Business : The Importance of Data Audits for Content SecurityMARQUETTE POREMBA, Sue.EContent (Wilton, Conn.). 2008, Vol 31, Num 8, issn 1525-2531, 6, 32-36 [5 p.]Article

L'ONU face à la société de l'information Quel rôle pour les etats et les collectivités territoriales ?LASSONDE, D. Louise.NETCOM (Issy-les-Moulineaux). 2007, Vol 21, Num 1-2, pp 25-36, issn 0987-6014, 12 p.Article

La revanche du territoire : L'évolution des politiques françaises en appui à la société de l'informationLATOUCHE, Daniel; COTE, Guillaume.NETCOM (Issy-les-Moulineaux). 2007, Vol 21, Num 1-2, pp 81-111, issn 0987-6014, 31 p.Article

Irish information society policyMC CAFFERY, Conor.NETCOM (Issy-les-Moulineaux). 2007, Vol 21, Num 1-2, pp 209-237, issn 0987-6014, 29 p.Article

How well are information risks being communicated to your computer end-users?PATTINSON, Malcolm R; ANDERSON, Grantley.Information management & computer security. 2007, Vol 15, Num 5, pp 362-371, issn 0968-5227, 10 p.Conference Paper

Privacy by designDUNCAN, George.Science (Washington, D.C.). 2007, Vol 317, Num 5842, pp 1178-1179, issn 0036-8075, 2 p.Article

The application of signature recognition to transparent handwriting verification for mobile devicesCLARKE, N. L; MEKALA, A. R.Information management & computer security. 2007, Vol 15, Num 2-3, pp 214-225, issn 0968-5227, 12 p.Article

We live here : Games,third places and the information architecture of the future : Information architectureHINTON, Andrew.Bulletin of the American Society for Information Science and Technology (Print). 2006, Vol 32, Num 6, pp 17-21, issn 1931-6550, 5 p.Article

Film as explicador for hypertextESSID, Joe.Computers and the humanities. 2004, Vol 38, Num 3, pp 317-333, issn 0010-4817, 17 p.Article

Online risks obstructing safe internet access for studentsLAZARINIS, Fotis.Electronic library. 2010, Vol 28, Num 1, pp 157-170, issn 0264-0473, 14 p.Article

Movilizando la Web : dónde y cómo vamos hacia una Web móvil = Mobilizing the Web : where are we going and how will we get there?MCCATHIENEVILE, Charles; MENDEZ, Eva.El Profesional de la información. 2009, Vol 18, Num 2, pp 121-127, issn 1386-6710, 7 p.Article

Merkur : herramienta de transcodificaciôn parametrizada de contenidos web para móviles = Merkur : custom transcodification tool for content adaptation to mobile devicesLOPEZ-DE-LA-FUENTE, José-Manrique.El Profesional de la información. 2009, Vol 18, Num 2, pp 218-222, issn 1386-6710, 5 p.Article

In Which ‘Linked Data’ Means ‘A Better Web’CHUDNOV, Daniel.Computers in libraries. 2009, Vol 29, Num 8, pp 31-33, issn 1041-7915, 3 p.Article

Virtual research environments ― a Web 2.0 cookbook? : Virtual research environments: Issues and opportunties for librariansMYHILL, Martin; SHOEBRIDGE, Michele; SNOOK, Lee et al.Library hi tech. 2009, Vol 27, Num 2, pp 228-238, issn 0737-8831, 11 p.Article

  • Page / 310