Free Delivery Over $100
2045 books were found.
Learn the essential tools for developing a sound service-oriented architecture SOA Modeling Patterns for Service-Oriented... Read More >>
This book provides rare insights into the nature of contemporary, technologically-facilitated government. Its multidisciplinary... Read More >>
Read More >>
The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September... Read More >>
Presenting contributions from 50 wireless communications experts from different corners of the world, this title... Read More >>
Bringing experiences, ideas, and applications of systemic thinking in designing and evaluating socio-technological... Read More >>
Although breaches of information security are not a new phenomenon,... Read More >>
1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo... Read More >>
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information... Read More >>
Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure... Read More >>
Looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce... Read More >>
In particolare vengono analizzati gli effetti dei nuovi sistemi di gestione dei diritti di proprietà intellettuale... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information... Read More >>
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally... Read More >>
Covers the complex security issues that face the mobile communications industry. This book discusses hacking and... Read More >>
The 13th International Conference on Human–Computer Interaction, HCI Inter- tional 2009, was held in San Diego,... Read More >>
The plenary session on Digital Forensics Practice included Troy O’Malley, Que- sland Police Service, who outlined... Read More >>
An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that... Read More >>
A fascinating, eclectic analysis of the changing geographies of play in contemporary society Read More >>
A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes... Read More >>
Written in clear, accessible prose, the Fourth edition of Computer Ethics brings together philosophy, law, and technology.... Read More >>