- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Exploring computer security as both a social and technical problem
Contents
Acknowledgements
Introduction
1. Naming the Threat
2. Security Transformations
3. Trust, Networks, and the Transformation of Organizational Power
4. IT Corporate Customers as End Users
5. Marketing Services
6. Situated Exclusions and Reinforced Power
Works Cited
Index



