Title: ActionScript Zero to Hero / Edition 1, Author: Jennifer Dehaan
Title: Amphibionics: Build Your Own Biologically Inspired Robot / Edition 1, Author: Karl Williams
Title: Appreciative Sharing of Knowledge: Leveraging Knowledge Management for Strategic Change, Author: Tojo Joseph Thatchenkery
Title: Async JavaScript: Build More Responsive Apps with Less Code / Edition 1, Author: Trevor Burnham
Title: Baghdad Burning: Girl Blog from Iraq / Edition 1, Author: Riverbend
Paperback from $13.76 $19.95 Current price is $13.76, Original price is $19.95.
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: Born to Blog: Building Your Blog for Personal and Business Success One Post at a Time / Edition 1, Author: Mark W. Schaefer
Title: Broken Promises: An Unconventional View of What Went Wrong at IBM, Author: Daniel Quinn Mills
Title: Capitalism and the Information Age: The Political Economy of the Global Communication Revolution / Edition 1, Author: Robert D. McChesney
Title: Challenges in Virtual Collaboration: Videoconferencing Audioconferencing and Computer--Mediated Communications, Author: Lynne Wainfan
Title: Code: And Other Laws of Cyberspace, Version 2.0 / Edition 2, Author: Lawrence Lessig
Title: Computer Security: 20 Things Every Employee Should Know / Edition 2, Author: Ben Rothke
Title: Computing: A Concise History, Author: Paul E. Ceruzzi
Title: Content Rules: How to Create Killer Blogs, Podcasts, Videos, Ebooks, Webinars (and More) That Engage Customers and Ignite Your Business / Edition 2, Author: Ann Handley
#13 in Series
Paperback from $18.25 $24.00 Current price is $18.25, Original price is $24.00.
Title: Creative Recording 1: Effects and Processors / Edition 2, Author: Paul White
Title: Credible Checklists and Quality Questionnaires: A User-Centered Design Method, Author: Chauncey Wilson
Title: Crisis Management at the Speed of the Internet: Trend Report, Author: Bob Hayes
Title: Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers

Pagination Links