Title: Digital Culture Unplugged: Probing the Native Cyborg's Multiple Locations / Edition 1, Author: Nalini Rajan
Title: Information Technology and Organizational Transformation / Edition 1, Author: Benoit Aubert
Title: Postcolonial Politics, The Internet and Everyday Life: Pacific Traversals Online / Edition 1, Author: M.I. Franklin
Title: The Bit and the Pendulum: From Quantum Computing to M Theory--The New Physics of Information / Edition 1, Author: Tom Siegfried
Title: The Evolution of Wired Life: From the Alphabet to the Soul-Catcher Chip -- How Information Technologies Change Our World / Edition 1, Author: Charles Jonscher
Title: Capitalism and the Information Age: The Political Economy of the Global Communication Revolution / Edition 1, Author: Robert D. McChesney
Title: Computer Security: 20 Things Every Employee Should Know / Edition 2, Author: Ben Rothke
Title: The Manager's Pocket Guide to Knowledge Management / Edition 1, Author: Kathleen Foley Curley
Title: Unleashing the Killer App: Digital Strategies for Market Dominance, Author: Larry Downes
Title: E-Business and Distributed Systems Handbook: Overview Module / Edition 1, Author: Amjad Umar
Title: E-Business and Distributed Systems Handbook: Networks Module, Author: Amjad Umar
Title: Experimental Statistics Using Minitab, Author: Colin Weatherup
Title: Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Credible Checklists and Quality Questionnaires: A User-Centered Design Method, Author: Chauncey Wilson
Title: User Interface Inspection Methods: A User-Centered Design Method, Author: Chauncey Wilson
Title: Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: The Myth of the Paperless Office, Author: Abigail J. Sellen
Title: The Language of ICT: Information and Communication Technology / Edition 1, Author: Tim Shortis
Title: Sketching User Experiences: The Workbook, Author: Saul Greenberg
Title: Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers

Pagination Links