You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Jonathan Pollard was thrust into the international spotlight when he was arrested by the U.S. government and accused of spying for Israel--the first major case where a U.S. intelligence official was accused of spying for a democratic ally. Now comes the only book based on research and confidential information smuggled out of jail by Pollard's family.
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.
How the blurring of media forms—transmedia—became the default for how we experience narratives, and how that cultural transformation has redefined the worlds of education, entertainment, and our increasingly polarized public discourse. Over the past decade, the power of narrative has been unleashed with awesome and terrifying consequences, and it has been consumed in its blurred media forms by millions of people as news, entertainment, and education. Imagining Transmedia, edited by Ed Finn, Bob Beard, Joey Eschrich, and Ruth Wylie, explores the surprising ways that narratives working across media forms became the default grammar for both media consumption and personal expression and how ...
With the rapid advancement in information technologies, e-business is rapidly growing in significance and is having a direct impact upon business applications and technologies. E-Business Models, Services and Communications provides researchers and practitioners with valuable information on recent advances and developments in emerging e-business models and technologies. This book covers a variety of topics such as e-business models, telecommunication network utilization, online consumer behavior, electronic communication adoption and service provider strategies, and privacy policies and implementation issues.
A wide range of special librarians from banking, finance, and government provide descriptive accounts of their respective collections in this comprehensive volume. They provide an introduction to some of the major library and archival resources available to bankers, financiers, and investors, as well as offer access to the historian and scholar doing research in some aspect of business. The collections represented include the Federal Reserve System, the Joint Bank-Fund Library of the International Monetary Fund and the World Bank, Standard & Poor’s, the Wells Fargo Corporation, the Lippincott Library of the Wharton School, and more.
This book represents the second phase of a multi-method, multi-study of the 'Information Systems Academic Discipline in Australia'. Drawing on Whitley's Theory of Scientific Change, the study analysed the degree of 'professionalisation' of the Information Systems Discipline, the overarching research question being 'To what extent is Information Systems a distinct and mature discipline in Australia?' The book chapters are structured around three main sections: a) the context of the study; b) the state case studies; and c) Australia-wide evidence and analysis. The book is crafted to be accessible to IS and non-IS types both within and outside of Australia. It represents a 'check point'; a snap...
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.
Social critic May asks professionals--whom he calls the leaders of culture in contemporary Western society--to abandon their self-interested pursuits and contribute to the common good.
The 2nd Edition of Who Owns You, David Koepsell’s widely acclaimed exploration of the philosophical and legal problems of patenting human genes, is updated to reflect the most recent changes to the cultural and legal climate relating to the practice of gene patenting. Lays bare the theoretical assumptions that underpin the injustice of patents on unmodified genes Makes a unique argument for a commons-by-necessity, explaining how parts of the universe are simply not susceptible to monopoly claims Represents the only work that attempts to first define the nature of the genetic objects involved before any ethical conclusions are reached Provides the most comprehensive accounting of the various lawsuits, legislative changes, and the public debate surrounding AMP v. Myriad, the most significant case regarding gene patents