Referencias Analíticas
*
WHAT CAUSES STRESS IN INFORMATION SYSTEMS PROFESSIONALS?
Sethi, Vikram
; King , Ruth C.
; Quick , James
pp.99-102; 28 cm. il
|
*
Toward an Integrated Framework for Modeling Enterprise Processes
Dalal, Nikunj P.
; Kamath, Manjunath
; Kolarik, William J.
; Sivaraman,, Eswar
pp.83-87; 28 cm. ;il.
|
*
THE ROLE OF PERSONALITY in Web-based Distance Education Courses
Kim, Eyong B.
; Schniederjans , Marc J.
pp.95-98; 28 cm. ; il
|
*
Rescue Robotics for Homeland Security
Murphy, Robin R
pp.66-68; 28 cm.; il.
|
*
QUESTIONING LAWFUL ACCESS TO TRAFFIC DATA
Escudero, Pascual
; Hosein , Lan
pp.77-82; 28 cm.; il
|
*
PROACTIVE INFORMATION GATHERING FOR HOMELAND SECURITY TEAMS
Kogut, Paul
; John , Yen
; Yui Leung , Paul
; Shuang Sun, Paul
; Rui, Wang
; Mielczarek , Ted
; Hellar, Ben
pp.48-50; 28 cm.; il
|
*
Mobility and the First Responder
Sawyer, Steve
; Tapia, Andrea
; Pesheck , Leonard
; Davenport , John
pp.62-65; 28 cm.; il
|
*
HOW TO MANAGE YOUR SOFTWARE PRODUCT LIFE CYCLE WITH MAUI
Suardi, Luigi
pp.89-94; 28 cm.;il
|
*
GRAPH-BASED TECHNOLOGIES FOR INTELLIGENCE ANALYSIS
Coffman, Thayne
; Greenblatt , Seth
; Marcus , Sherry
pp.45-47; 28 cm.;il
|
*
EMERGING TECHNOLOGIES FOR HOMELAND SECURITY
John, Yen
pp33-35; 28 cm.; il
|
*
CYBER DEFENSE: ART TO SCIENCE
Saydjari, O., Sami
pp.53-57; 28 cm; il
|
*
CYBER DEFENSE: ART TO SCIENCE
Saydjari O., Sami
pp.53-57; 28 cm; il
|
*
CYBER DEFENSE TECHNOLOGY NETWORKING AND EVALUATION
Bajcsy, R.
; Benzel , T
; Bishop , M.
; Braden, B.
; Brodley , C.
; Fahmy , S.
; Floyd, S.
; Hardaker , W.
; Joseph, A.
; Kesidis , G.
; Levitt, K.
; Lindell , B.
; Liu, P
; Rosenberg, C.
pp.59-61; 28 cm.; il
|
*
COUNTERING TERRORISM THROUGH INFORMATION TECHNOLOGY
Popp, Robert
; Armour , Thomas
; Senator , Ted
; Numrych , Kristen
pp.36-43; 28 ; il.
|
*
AUTOMATICALLY DETECTING DECEPTIVE CRIMINAL IDENTITIES
Gang, Wang
; Hsinchun , Chen
; Atabakhsh , Homa
pp.-76-71; 28 cm. il.
|
|