Information Security and Ethics: Social and Organizational Issues Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student... Virtual Education: Cases in Learning & Teaching Technologies Early computer researchers sought ways to use the new invention for learning
and teaching purposes. Instructional computing at that time took place on mainframes
in the form of typing and reading text, but serious efforts were made to
further utilize the computer power to serve education. Examples include the Programmed
UML and the Unified Process This book provides a set of readings on the state-of-the-art and the state-of-thepractice
of the Unified Modeling Language (UML) and the Unified Process (UP).
UML is a language for specifying, visualizing, constructing and documenting
software- intensive systems. It is a unifier of proven software modeling languages that
Skills for Managing Rapidly Changing IT Projects The subject of this book is the skills that are needed for managing software
projects in the Internet era, when projects evolve rapidly, requirements change
often, and new methodologies, techniques, and tools for management emerge.
In this book, I have tried to transfer all my experience and the lessons learned
Video Data Management and Information Retrieval Video data management and information retrieval are very important areas of
research in computer technology. Plenty of research is being done in these fields at
present. These two areas are changing our lifestyles because together they cover
creation, maintenance, accessing, and retrieval of video, audio, speech, and text data
Mobile and Wireless Systems Beyond 3G: Managing New Business Opportunities With the rapid growth of the wireless mobile applications, wireless voice has
begun to challenge wireline voice, whereas the desire to access e-mail, surf the
Web or download music (e.g., MP3) wirelessly is increasing for wireless data.
While second generation (2G) cellular wireless systems, such as cdmaOne1,
GSM2 and TDMA3,...
Modern Software Review: Techniques and Technologies The overall objective and mission the proposed book is to provide:
• An understanding of the critical factors affecting software review
• Practical guidelines for software reviews.
Readers will gain a deep understanding of current software review literature
and theoretical models for analysis...
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...
|Result Page: 5 4 3 2 1 |