Sold Out
Book Categories |
Acknowledgments ix
Introduction 1
Chapter 1 Naming the Threat 17
Chapter 2 Security Transformations 45
Chapter 3 Trust, Networks, and the Transformation of Organizational Power 61
Chapter 4 IT Corporate Customers as End Users 93
Chapter 5 Marketing Service 125
Chapter 6 Situated Exclusions and Reinforced Power 159
Works Cited 213
Index 219
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionTechnological Turf Wars: A Case Study of the Computer Antivirus Industry
X
This Item is in Your InventoryTechnological Turf Wars: A Case Study of the Computer Antivirus Industry
X
You must be logged in to review the productsX
X
X
Add Technological Turf Wars: A Case Study of the Computer Antivirus Industry, , Technological Turf Wars: A Case Study of the Computer Antivirus Industry to the inventory that you are selling on WonderClubX
X
Add Technological Turf Wars: A Case Study of the Computer Antivirus Industry, , Technological Turf Wars: A Case Study of the Computer Antivirus Industry to your collection on WonderClub |