Feeds
75%
Out of this World

Out of this World science fiction exhibition

Sci-Fi at the Brit Li

Top three mobile application threats

Review Christmas 1977, my parents bought me a copy of Pan Books' The Visual Encyclopedia of Science Fiction.

Visual Encyclopedia of Science Fiction

The progenitor?

I'd been reading 2000AD since April - from issue eight, since you ask - and was soon devouring secondhand paperbacks by John Christopher, John Wyndham, Arthur C Clarke and such, and eagerly devouring anything I could find about a new movie called Star Wars.

'My, the boy's keen,' Mum and Dad thought, and decided that the said reference work would introduce me to new authors and ideas.

They didn't look at it, I suspect - at least not thoroughly. Had they done so, they might not have thought a book with a section entitled 'Sex and Taboos' - introduced by the criminally underrated British writer Keith Roberts - suitable reading matter for a ten-year-old.

Looking at it now, that is clearly the most thumbed section of the book, but I lapped up the whole Encyclopedia and its huge selection of art cribbed from book covers and magazine illustrations.

Out of this World

Tome machine: Out of this World looks to back in time, to books

The Encyclopedia was prefaced with a historical timeline, charting the publication of seminal works of science fiction right back beyond the 19th Century, but its main approach was to tackle SF's abiding themes: 'Spacecraft and Star Drives', 'Galactic Empires', 'Time and Nth Dimensions', 'Robots and Androids', 'Telepathy, Psionics and ESP', and such.

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.