University of Hertfordshire

Publications

  1. Other report › Research
  2. Authentication v Certification

    Low, M. R. & Christianson, B., 1995, University of Hertfordshire. (UH Computer Science Technical Report; vol. 216)

    Research output: Book/ReportOther report

  3. Avoiding future Famines: Strengthening the Ecological Foundation of Food Security through Sustainable Food Systems

    Alder, J., Barling, D., Dugan, P., Herren, H. R., Josupeit, H., Lang, T., Lele, U., McClennen, C., Murphy-Bokem, D., Scherr, S., Willmann, R. & Uphoff, N., 2012, Nairobi, Kenya: United Nations Environment Programme. 80 p.

    Research output: Book/ReportOther report

  4. B-CCD: a framework to enable SMEs to make business-critical computing decisions

    Bennett, J., Berenbaum, R., Hinton, P., Tagg, C. & Ward, B. K., 1997, University of Hertfordshire. (UH Computer Science Technical Report; vol. 273)

    Research output: Book/ReportOther report

  5. BP&ISR: an analysis of factors in the Sri Lankan context

    Weerakkody, V., 1996, University of Hertfordshire. (UH Computer Science Technical Report; vol. 251)

    Research output: Book/ReportOther report

  6. BPR - a UK case study

    Weerakkody, V., 1995, University of Hertfordshire. (UH Computer Science Technical Report; vol. 230)

    Research output: Book/ReportOther report

  7. Basically... porn is everywhere: a rapid evidence assessment on the effects that access and exposure to pornography has on children and young people

    Horvath, M. A. H., Alys, L., Massey, K., Pina, A., Scally, M. & Adler, J. R., 1 May 2013, London, UK: Office of the Children's Commissioner for England. 88 p.

    Research output: Book/ReportOther report

  8. Before the project everything seemed a little bit woolly - now we are definitely clearer in terms of pathways for women. Evaluating the Stella Mental Health Initiative: executive summary

    Horvath, M. A. H., Hansen, S., Apena, F., Adler, J. R. & Holly, J., 1 May 2013, London, UK: Forensic Psychological Services, Middlesex University and Against Violence and Abuse.

    Research output: Book/ReportOther report

  9. Binding bit patterns to real world entities

    Christianson, B. & Malcolm, J., 1997, University of Hertfordshire. (UH Computer Science technical Report; vol. 306)

    Research output: Book/ReportOther report

  10. Bridging the gap between business process reeingineering and information systems: identifying key issues

    Weerakkody, J., Tagg, C. & Bennett, J., 1995, University of Hertfordshire. (UH Computer Science Technical Report; vol. 262)

    Research output: Book/ReportOther report

  11. Building a requirements process improvement model

    Beecham, S., Hall, T. & Rainer, A., 2003, University of Hertfordshire.

    Research output: Book/ReportOther report

Previous 1...3 4 5 6 7 8 9 10 ...33 Next