 |
|
 E-procurement in Emerging Economies: Theory and Cases"Information systems are shaped by the environment in which they operate, and e-Procurement in Emerging Economies: Theory and Cases explains how e-procurement is shaped in emerging economies. Contributors from Italy, China, India, Turkey, Slovenia, Australia, and UK have submitted case studies and theoretical insights on e-procurement and its... |  |  E-government Research: Policy and ManagementVirtual technology is increasingly prevalent in all spheres of daily life, including infiltration into governmental policies, processes, infrastructures, and frameworks. E-Government Research: Policy and Management provides scholars and practitioners with a critical mass of research on the integration, management, implications,... |  |  Connect!: A Guide to a New Way of Working from GigaOM's Web Worker DailyAre you a web worker?
You are if you use the web to reach out beyond the confines of your office, cubicle, home workspace, or seat at the coffee shop to connect and collaborate with others doing the same thing. In this book you'll learn how to use new web tools to improve your work life. You'll discover web... |
|
 |  |  Open Source: Technology and Policy"Provide[s] a well laid out review of the open source movement, including its technologies, policies, and impact and implications.... Overall, this book ties together the many interlocking pieces within the development and history of the open source movement." -- A. Hollister, State University of Cortland, CHOICE
The open... |  |  Turing (A Novel about Computation)Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a... |
|
 OSSEC Host-Based Intrusion Detection GuideNovember 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,... |  |  Software Development FailuresFailed or abandoned software development projects cost the U.S. economy alone billions of dollars a year. In Software Development Failures, Kweku Ewusi-Mensah offers an empirically grounded study that suggests why these failures happen and how they can be avoided. Case studies analyzed include the well-known Confirm travel industry... |  |  |
|
 |  |  The Development and Treatment of Girlhood AggressionAfter decades of neglect, researchers have begun to focus attention on the development and outcomes of girlhood aggression. This comprehensive volume provides an account of some of the pioneering research in the field. Its central aims are to highlight current understanding, identify key components for preventing and treating the complex array of... |  |  |
|
Result Page: 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 |