Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computing Milieux (K)  
  Computing Milieux (K) See Reviews  
K.0 General (49)
K.1 The Computer Industry (192)
K.2 History of Computing (17)
K.3 Computers And Education
  General (157)
  Computer Uses in Education (3)
  Computer And Information Science Education (253)
  Miscellaneous (67)
K.4 Computers And Society
  General (323)
  Public Policy Issues (320)
  Social Issues (316)
  Organizational Impacts (502)
  Electronic Commerce (356)
  Miscellaneous (70)
K.5 Legal Aspects Of Computing
  General (108)
  Hardware/Software Protection (56)
  Governmental Issues (95)
  Miscellaneous (18)
K.6 Management Of Computing And Information Systems
  General (355)
  Project And People Management (4)
  Installation Management (120)
  Software Management (562)
  System Management (296)
  Security and Protection (945)
  Miscellaneous (35)
K.7 The Computing Profession
  General (88)
  Occupations (80)
  Organizations (32)
  Testing, Certification, And Licensing (42)
  Professional Ethics (56)
  Miscellaneous (29)
K.8 Personal Computing
  General (12)
  Application Packages (4)
  Hardware (26)
  Management/Maintenance (31)
  Miscellaneous (17)
K.m Miscellaneous (40)
Reviews limited to:

Reviews in category "Computing Milieux (K)":
Fundamentals of IP and SoC security: design, verification, and debug
Bhunia S., Ray S., Sur-Kolay S.,  Springer International Publishing, New York, NY, 2017. 316 pp. Type: Book (978-3-319500-55-3)
Cyber security and the role of intelligent systems in addressing its challenges
Harel Y., Ben-Gal I., Elovici Y.  ACM Transactions on Intelligent Systems and Technology 8(4): 1-12, 2017. Type: Article
Technology, society and sustainability: selected concepts, issues and cases
Zacher L.,  Springer International Publishing, New York, NY, 2017. 442 pp. Type: Book (978-3-319471-62-4)
Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A.  Personal and Ubiquitous Computing 20(6): 875-884, 2016. Type: Article
Do not trust build results at face value: an empirical study of 30 million CPAN builds
Zolfagharinia M., Adams B., Guéhéneuc Y.  MSR 2017 (Proceedings of the 14th International Conference on Mining Software Repositories, Buenos Aires, Argentina,  May 20-28, 2017) 312-322, 2017. Type: Proceedings

Related Topics

Electronic Commerce
  - Administrative Data Processing

Software Management
  - Management

Security and Protection
  - Social Issues
  - Security and Protection

Professional Ethics
  - Computers And Society
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy