Building the Virtual State: Information Technology and Institutional Change by Jane E. Fountain “Building the Virtual State: Information Technology and Institutional Change” by Jane E. Fountain, published in 2001. It is a foundational text in the study of e-government and digital transformation within the public sector. The book explores how the U.S. public sector must evolve…
Computer Networks and Internets Global Edition, Sixth Edition written by Douglas E. Comer The book covers concepts, principles, and technologies related to computer networking and the Internet, suitable for introductory-to-intermediate courses. This edition, published in 2015, provides a comprehensive overview of computer networking concepts, principles, and technologies, including data communications, packet switching, and TCP/IP. It…
Computer Security Third Edition written by Dieter Gollmann Computer Security, Third Edition, by Dieter Gollmann, a professor at the Hamburg University of Technology. Published by Wiley, it is a widely used textbook for introductory and advanced computer science courses. Author: Dieter Gollmann. Topic: Foundations of computer security, covering network security, operating systems, and databases. Publisher: John Wiley & Sons. The…
Critique of Security by Mark Neocleous Critique of Security, Mark Neocleous challenges the standard view that “security” is an unquestionable good. Instead, he argues that it is a “political technology” used to build and maintain liberal order. The book argues that security is not just a public good, but a central concept used by the…
Developing Information Systems: Concepts, Issues and Practice Developing Information Systems: Concepts, Issues and Practice (Second Edition) by Chrisanthi Avgerou and Tony Cornford. It focuses on the organizational aspects of information systems rather than just the technological side. It examines information systems (IS) primarily as organizational phenomena rather than just technological ones. Publisher: Palgrave Macmillan
Everyday Cryptography Fundamental Principles and Applications, 2nd Edition written by Keith M. Martin Subject: An introductory guide to cryptography and its applications in daily technologies like mobile phones, Wi-Fi, and payment cards. Author: Keith M. Martin, a professor in the Information Security Group at Royal Holloway, University of London. Key Features: It focuses on fundamental principles rather than…
Fighting Computer Crime: A New Framework for Protecting Information by Donn B. Parker Fighting Computer Crime: A New Framework for Protecting Information by Donn B. Parker, first published in 1998. This book argues that traditional computer security methods are dangerously simplistic and failing to address the evolving landscape of criminal threats. Author: Donn B. Parker. Publisher: Wiley. Focus: Computer…
Information Security Management Principles, edited by Andy Taylor with contributors David Alexander, Amanda Finch, and David Sutton, published by BCS, Second Edition, The Chartered Institute for IT. Information Security Management Principles, Second Edition. It is an educational textbook published by BCS, The Chartered Institute for IT. This specific edition was edited by Andy Taylor, with contributions…
Interaction Design: Beyond Human-Computer Interaction (3rd Edition) Interaction Design Beyond Human-Computer Interaction 3rd Edition by Helen Sharp, Yvonne Rogers, and Jenny Preece. This authoritative textbook offers a comprehensive introduction to the field of interaction design, focusing on how to create engaging, effective, and user-friendly interfaces between people and technology. Written by leading experts Helen Sharp,…
Multimedia Communications: Applications, Networks, Protocols, and Standards, written by Fred Halsall and published by Addison-Wesley Subject: Covers the foundational material and varied media types (text, images, speech, audio, and video) for multimedia communications. Target Audience: Designed for students in computer science and electronic engineering. Content: Focuses on communication protocols, standards, and network design examples necessary for advanced interactive…
Network Security Essentials: Applications and Standards Sixth Edition Network Security Essentials: Applications and Standards Sixth Edition by William Stallings, published by Pearson (Global Edition). This textbook is a standard resource for undergraduate and professional courses in computer science and engineering, focusing on the practical application of cryptography and network security protocols. It is a…
Project Research in Information Systems: A Student’s Guide Project Research in Information Systems A Student’s Guide by Tony Cornford and Steve Smithson second edition. The book is specifically designed to provide guidance for final year undergraduate and master’s level students tackling information systems projects. Published: by Palgrave Macmillan This text provides a comprehensive blend of…
Security in Computing, Fifth Edition, authored by Charles P. Pfleeger, Shari Lawrence Pfleeger, and Jonathan Margulies This book is “Security in Computing,” Fifth Edition, a comprehensive textbook on computer security. It is authored by Charles P. Pfleeger, Shari Lawrence Pfleeger, and Jonathan Margulies. Subject: Information technology and computer security. Publisher: Prentice Hall. Key Details: Purpose: It serves as a definitive…
Soft Systems Methodology in Action by Peter Checkland and Jim Scholes, published by Wiley It explores practical applications of systems thinking to complex, real-world human problems. It provides a mature account of Soft Systems Methodology (SSM), an approach designed to tackle “messy,” ill-structured management and social problems where objectives themselves may be unclear.
Strategic Information Systems A European Perspective Strategic Information Systems: A European Perspective, a collection of papers and case studies edited by Claudio Ciborra and Tawfik Jelassi. Published in 1994 by Wiley, it is part of the “Wiley Series in Information Systems”. Publisher: John Wiley & Sons Publication Date: January–May 1994 The book is divided into two primary sections that explore the development and…
Sustainable Energy: Choosing Among Options (Second Edition) Sustainable Energy: Choosing Among Options (Second Edition), authored by Jefferson W. Tester, Elisabeth M. Drake, Michael J. Driscoll, Michael W. Golay, and William A. Peters. Publisher: The MIT Press. Publication Date: September 28, 2012. Key Topics: Covers renewable energy technologies, resource estimation, environmental impacts, and economic evaluations. Audience: Designed for advanced undergraduate and…
Networking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition) by Douglas E. Comer Subject: Computer networking and internet protocols. Publisher: Prentice Hall. Publication Date: 2000. The book is structured to guide a reader from basic hardware concepts up to complex applications: Foundations: Introduction to network hardware and the conceptual architectural model. Core Protocols: Detailed look at IP addressing, ARP,…