Title: Things a Computer Scientist Rarely Talks About, Author: Donald E. Knuth
Title: Rekursive Funktionen / Edition 1, Author: Heinz Lïneburg
Title: Beyond Calculation: The Next Fifty Years of Computing / Edition 1, Author: Peter J. Denning
Title: Federated Identity Primer, Author: Derrick Rountree
Title: Computer Resources for People with Disabilities: A Guide to Assistive Technologies, Tools and Resources for People of All Ages / Edition 4, Author: Alliance for Technology Access
Title: Human Resource Management in the Knowledge Economy: New Challenges, New Roles, New Capabilities, Author: Mark L. Lengnick-Hall
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Delete: The Virtue of Forgetting in the Digital Age, Author: Viktor Mayer-Schönberger
Title: Geomedia: Networked Cities and the Future of Public Space / Edition 1, Author: Scott McQuire
Title: Appreciative Sharing of Knowledge: Leveraging Knowledge Management for Strategic Change, Author: Tojo Joseph Thatchenkery
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: What Is Six SIGMA? / Edition 1, Author: Peter S. Pande
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: The Language of ICT: Information and Communication Technology / Edition 1, Author: Tim Shortis
Title: IT-Projektmanagement kompakt / Edition 3, Author: Pascal Mangold
Title: Sketching User Experiences: The Workbook, Author: Saul Greenberg
Title: User Interface Inspection Methods: A User-Centered Design Method, Author: Chauncey Wilson
Title: Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems, Author: Eoghan Casey BS

Pagination Links