Ethical and social issues in the information age
| Main Author: | Kizza, Joseph Migga (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York
Springer
c2013
|
| Edition: | 5th ed |
| Series: | Texts in computer science
|
| Subjects: | |
| Online Access: | Connect to resource Connect to resource Connect to resource (off-campus access) |
Similar Items
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
Computers as theatre
by: Laurel, Brenda
Published: (1991)
by: Laurel, Brenda
Published: (1991)
Designing the user interface strategies for effective human-computer interaction
by: Shneiderman, Ben
Published: (1998)
by: Shneiderman, Ben
Published: (1998)
Designing the user interface strategies for effective human-computer interaction
by: Shneiderman, Ben, et al.
Published: (2005)
by: Shneiderman, Ben, et al.
Published: (2005)
Designing the user interface strategies for effective human-computer interaction
by: Shneiderman, Ben, et al.
Published: (2017)
by: Shneiderman, Ben, et al.
Published: (2017)
Designing the user interface strategies for effective human-computer interaction
by: Shneiderman, Ben, et al.
Published: (2005)
by: Shneiderman, Ben, et al.
Published: (2005)
Observing the user experience a practitioner's guide to user research
by: Kuniavsky, Mike
Published: (2003)
by: Kuniavsky, Mike
Published: (2003)
User interface design
by: Thimbleby, Harold
Published: (1990)
by: Thimbleby, Harold
Published: (1990)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Constructing the user interface with statecharts
by: Horrocks, Ian 1971-
Published: (1999)
by: Horrocks, Ian 1971-
Published: (1999)
Shared Encounters
by: Willis, Katharine S.
Published: (2010)
by: Willis, Katharine S.
Published: (2010)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Human-computer etiquette cultural expectations and the design implications they place on computers and technology
by: Hayes, Caroline C., et al.
Published: (2011)
by: Hayes, Caroline C., et al.
Published: (2011)
The developer's handbook to interactive multimedia a practical guide for educational applications
by: Phillips, Rob
Published: (1997)
by: Phillips, Rob
Published: (1997)
Designing multimedia a visual guide to multimedia and online graphic design
by: Lopuck, Lisa
Published: (1996)
by: Lopuck, Lisa
Published: (1996)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Sketch-based interfaces and modeling
by: Jorge, Joaquim, et al.
Published: (2011)
by: Jorge, Joaquim, et al.
Published: (2011)
Cryptographic protocol security analysis based on trusted freshness
by: Ling, Dong, et al.
Published: (2012)
by: Ling, Dong, et al.
Published: (2012)
User interface design a software engineering perspective
by: Lauesen, Soren
Published: (2005)
by: Lauesen, Soren
Published: (2005)
Universal UX design building multicultural user experience
by: Ferreira, Alberto
Published: (2017)
by: Ferreira, Alberto
Published: (2017)
User interaction techniques in computing
by: Monaghan, Christina
Published: (2014)
by: Monaghan, Christina
Published: (2014)
Electronic payment systems for E-commerce
by: O'Mahony, Donal , 1961-, et al.
Published: (2001)
by: O'Mahony, Donal , 1961-, et al.
Published: (2001)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
نحو الواجهة العملية بين المخ والحاسب عبور الفجوة بين البحث العلمي وتطبيقات الحياة العملية عبور الفجوة بين البحث العلمي وتطبيقات الحياة العملية
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Serious games foundations, concepts and practice
Published: (2016)
Published: (2016)
Encyclopaedia of humanities and social sciences
by: Sashi, S. S.
Published: (1992)
by: Sashi, S. S.
Published: (1992)
Quantifying the user experience practical statistics for user research
by: Sauro, Jeff, et al.
Published: (2016)
by: Sauro, Jeff, et al.
Published: (2016)
The essential guide to user interface design an introduction to GUI design principles and techniques
by: Galitz, Wilbert O.
Published: (2007)
by: Galitz, Wilbert O.
Published: (2007)
The GUI style guide
by: Fowler, Susan L. 1953-, et al.
Published: (1995)
by: Fowler, Susan L. 1953-, et al.
Published: (1995)
Handbook of usability testing how to plan, design, and conduct effective tests
by: Rubin, Jeffrey 1949-, et al.
Published: (2008)
by: Rubin, Jeffrey 1949-, et al.
Published: (2008)
Developing user interfaces : ensuring usability through product & process
by: Hix, Deborah , 1950-, et al.
Published: (1993)
by: Hix, Deborah , 1950-, et al.
Published: (1993)
Artificial intelligence in the age of neural networks and brain computing
Published: (2018)
Published: (2018)
Data structures with abstract data types and pascal
by: Stubbs, Daniel F., et al.
Published: (1985)
by: Stubbs, Daniel F., et al.
Published: (1985)
Cyrptography in constant parallel time
by: Applebaum, Benny
Published: (2014)
by: Applebaum, Benny
Published: (2014)
Similar Items
-
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007) -
Computers as theatre
by: Laurel, Brenda
Published: (1991) -
Designing the user interface strategies for effective human-computer interaction
by: Shneiderman, Ben
Published: (1998) -
Designing the user interface strategies for effective human-computer interaction
by: Shneiderman, Ben, et al.
Published: (2005) -
Designing the user interface strategies for effective human-computer interaction
by: Shneiderman, Ben, et al.
Published: (2017)