Title: Mathematical Theory of Advanced Computing, Author: Wolfgang W. Osterhage
Title: Geomedia: Networked Cities and the Future of Public Space / Edition 1, Author: Scott McQuire
Title: User Interface Inspection Methods: A User-Centered Design Method, Author: Chauncey Wilson
Title: Credible Checklists and Quality Questionnaires: A User-Centered Design Method, Author: Chauncey Wilson
Title: Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems, Author: Eoghan Casey BS
Title: Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Federated Identity Primer, Author: Derrick Rountree
Title: Sketching User Experiences: The Workbook, Author: Saul Greenberg
Title: Delete: The Virtue of Forgetting in the Digital Age, Author: Viktor Mayer-Schönberger
Title: Appreciative Sharing of Knowledge: Leveraging Knowledge Management for Strategic Change, Author: Tojo Joseph Thatchenkery
Title: The Illustrated Guide to Assistive Technology & Devices: Tools And Gadgets For Living Independently / Edition 1, Author: Suzanne Robitaille
Title: Postcolonial Politics, The Internet and Everyday Life: Pacific Traversals Online / Edition 1, Author: M.I. Franklin
Title: Information Feudalism: Who Owns the Knowledge Economy?, Author: Peter Drahos
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Computer Security: 20 Things Every Employee Should Know / Edition 2, Author: Ben Rothke
Title: Computer Resources for People with Disabilities: A Guide to Assistive Technologies, Tools and Resources for People of All Ages / Edition 4, Author: Alliance for Technology Access
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick

Pagination Links