Free Delivery Over $100
2045 books were found.
Read More >>
Offers a comprehensive roadmap for designing and implementing an effective information security program. This title... Read More >>
The Internet has now become an integral part of everyday life for hundreds of millions of people around the world.... Read More >>
This book is an appraisal of the Computerization of Land Records (CoLR) scheme launched by the Centre in 1988-89... Read More >>
In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included... Read More >>
This book explores the relationship between technological change, society and the law, and the powerful role that... Read More >>
The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary... Read More >>
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent... Read More >>
Constitutes the refereed proceedings of the International Conference on E-Government, TCGOV 2005, held in Bolzano,... Read More >>
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally... Read More >>
Explores the challenges in mobile computing. This book describes various aspects of mobile computing, from basic... Read More >>
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies.... Read More >>
Covering a variety of IT contracts, this book provides an outline of the structure and contents of the contract,... Read More >>
This book examines the political and developmental implications of the new information and communication technologies... Read More >>
The Digital Umbrella capitalizes on the recent trends in the technology landscape, all of which have been widely... Read More >>
The online music revolution has brought the weakness of the law to the forefront. Anonymous theft, with little risk... Read More >>
Presents an overview of information systems security, offering the basic underpinnings of information security and... Read More >>
Understand the legal foundations of Open Source licenses -and why SCO's politically charged attack on Linux and... Read More >>
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides... Read More >>
Vom eBay-Anfänger bis zum Powerseller oder Verkaufsagenten: Hier finden Sie auf alle rechtlichen Fragen, die sich... Read More >>
Nuestro derecho y su filosofía fueron concebidos para un mundo económico material signado por el reparto de la escasez... Read More >>