![]() | Up a level |
Mackay, M, Baker, T and Al-Yasiri, A 2012, 'Security-oriented cloud computing platform for critical infrastructures' , Computer Law and Security Review, 28 (6) , pp. 679-686. |
Taylor, M, Haggerty, J and Gresty, D 2010, 'The legal aspects of corporate computer usage policies' , Computer Law and Security Review, 26 (1) , pp. 72-76. |