Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Vishik, Claire
Sterling Commerce, Standards and Technology Strategy
Austin, Texas
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 9 of 9 reviews

   
   In the bubble: designing in a complex world
Thackara J., The MIT Press, Cambridge, MA, 2005. 288 pp.  Type: Book (9780262201575)

This is a book about everything. In the world of so many man-made products and artifacts, it is important to observe natural adaptations and examples of usage in order to design a device, a process, or a system that will work. This ide...

Dec 19 2005  
   Digital communities in a networked society: e-commerce, e-business & e-government
Mendes M., Suomi R., Passos C., Kluwer Academic Publishers, Norwell, MA, 2004. 472 pp.  Type: Book (9781402077951)

This volume is a collection of papers presented during the Third Institute for Electrical and Electronics Engineers (IEEE) Conference on e-Commerce, e-Business, and e-Government, held in Brazil in 2003. The papers are divided into nine...

Oct 12 2005  
   Information technology security: advice from experts (IT Solutions series)
Oliva L., IRM Press, 2004.  Type: Book (9781591402473)

Today, security occupies a place of special importance in information technology (IT) activities. The number and sophistication of attacks grows every year, and legislation—such as the Health Insurance Portability and Acc...

Apr 18 2005  
   Advances in computers: information security
Zelkowitz M., Academic Press, Inc., Orlando, FL, 2004.  Type: Book (9780120121601)

Changes in the technology landscape, and new aspects of established technological areas, are the focus of this book. Security is the focus of four of the seven chapters. Academics, practitioners, researchers, and journalists are among ...

Apr 4 2005  
   Security in fixed and wireless networks: an introduction to securing data communications
Schäfer G., John Wiley & Sons, Inc., 2004.  Type: Book (9780470863701)

Wireless networks are becoming an increasingly important part of the communication infrastructure, enabling mission critical applications, and transmitting crucial payloads. As the role of wireless networks grows, the issue of security...

Jan 13 2005  
   Securing Web services with WS-Security: demystifying WS-Security, WS-Policy, SAML, XML signature, and XML encryption
Rosenberg J., Remy D., Pearson Higher Education, 2004.  Type: Book (9780672326516)

The subtitle of this book is an apt indication of many developers’ and technologists’ confusion in understanding and using the many emerging, still immature, and overlapping standards that are being applied to Web s...

Sep 17 2004  
   Fundamentals of computer security
Pieprzyk J., Seberry J., Hardjono T., Springer-Verlag New York, Inc., Secaucus, NJ, 2002. 677 pp.  Type: Book (9783540431015), Reviews: (2 of 2)

This book evolved from the lecture notes that were used to teach an undergraduate computer security course at the University of Wollongong, Australia. The resulting volume is much too extensive and sophisticated to be use...

Apr 20 2004  
   Design through digital interaction
Peng C., Intellect Books, Exeter, UK, 2003. 212 pp.  Type: Book (9781841508443)

Written by a single author, this book has emerged from a collection of earlier collaborative writings, and discusses the issues of architectural design carried out through digital collaboration. I am not an architect, but I have a lot ...

Feb 26 2004  
   The Columbia guide to digital publishing
Kasdorf W. (ed) Columbia University Press, New York, NY, 2003.  Type: Divisible Book

This is a comprehensive source of information on many aspects of online publishing. The guide was designed to be a book that “grows with you,” and can be accessed through multiple entry points; there are heterogeneo...

Oct 16 2003  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy