Ajay Gupta, Scott Laliberte

Defend I.T. : Security by Example


The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than ...


Bernard A. Galler

Software and Intellectual Property Protection


How has the legal system used its traditional body of copyright and patent law to protect rights in computer software? The last 15 years have changed the entire landscape with regard to the creation and protection of software as intellectual ...

Simon Bell, Routledge

Learning With Information Systems: Learning Cycles in Information Systems Development (Routledge Studies in Information and Library Management Systems, 1)


In Learning with Information Systems the author takes the developing world as the context and through a series of case studies develops a commonly used systems analysis methodology. He demonstrates how this methodology can evolve and adapt as new ...

Mackenzie Wark

A Hacker Manifesto


A double is haunting the world--the double of abstraction, the virtual reality of information, programming or poetry, math or music, curves or colorings upon which the fortunes of states and armies, companies and communities now depend. The bold ...


<<<  Martin Brighty. Winning E-brand Strategies : Developing ...             Pacific-Asia Conference on Knowledge Discovery ... >>>




На главную

Магнитогорск, Новокуйбышевск, Жуковский, Иваново, Жуковский, Оренбург, Новочеркасск, Электросталь, Владикавказ, Железнодорожный, Салават,
Хирургия| Бои без правил|
молодая гвардия книжный, аудиокнига детям, книжные магазины санкт, библиотека литературы, книги заказать, московский дом книги, заказ книг, учебник, книжный магазин адрес, бизнес книга, энцеклопедия, букинистика, интернет библиотека, аудио книги,


Хостинг от uCoz