Resultados de búsqueda - ((international critical) OR (international court)) of computer science~

Buscar alternativas:

  • Mostrando 1 - 2 Resultados de 2
Limitar resultados
  1. 1

    Structured techniques : the basis for CASE / por Martin, James

    Publicado 1988
    Tabla de Contenidos: “…731 (14) Patterns of Evolution 731 (1) Phases of Growth of Management Science 732 (2) Phases of Growth of Structured Techniques 734 (2) Shock 736 (2) Inadequacy 738 (1) The Automation of Automation 739 (1) Rigorous Specification 740 (1) Meat Machines 740 (1) Theoretical Principles 741 (1) Future Growth of Automated Methods 742 (3) 51 The Move Toward True Engineering 745 (12) Introduction 745 (1) Software Misengineering 745 (1) Characteristics of Engineering 746 (3) Power Tools 749 (3) Information Engineering 752 (1) Resistance to New Methods 753 (4) 52 Epilogue: The Future 757 (6) The Revolution: Its Causes and Outcome 757 (3) A Way to Think About Systems 760 (1) The Changing Computer Industry 760 (3) Index 763…”
    Libro
  2. 2

    Criminology today : an integrative introduction / por Schmalleger, Frank

    Publicado 2004
    Tabla de Contenidos: “…431 (1) Notes 431 (4) CHAPTER 14 TECHNOLOGY AND CRIME 435 (32) Introduction 436 (1) The Advance of Technology 436 (1) High Technology and Criminal Opportunity 437 (5) Technology and Criminal Mischief 440 (1) Computer Crime and the Law 441 (1) A Profile of Computer Criminals 442 (7) Theory versus Reality: Wisconsin Defines Computer Crime 443 (1) Theory versus Reality: Colorado Defines Computer Crime 444 (1) The History and Nature of Hacking 445 (1) Theory versus Reality: The Computer Hacker: A Psychological and Social Profile 446 (1) Theory versus Reality: Technological Attraction 447 (1) Crime in the News: Identity Theft Thrives in Cyberspace 448 (1) Computer Crime as a Form of White-Collar Crime 449 (1) The Information Superhighway and Data Security 449 (2) Technology in the Fight against Crime 451 (5) DNA Fingerprinting 452 (2) Crime in the News: National DNA Database Solves Its First Crime 454 (1) Computers as Crime-Fighting Tools 455 (1) Combating Computer Crime 456 (2) Police Investigation of Computer Crime 457 (1) Dealing with Computer Criminals 458 (1) Policy Issues: Personal Freedoms in the Information Age 458 (1) Theory versus Reality: Press Release Announcing the Formation of the Electronic Frontier Foundation 459 (1) What the Future Holds 459 (1) Summary 460 (1) Discussion Questions 461 (1) Web Quest! …”
    Libro