Innovation Games: Creating Breakthrough Products Through Collaborative Play : 9780321437297

Innovation Through Understandingsm


The toughest part of innovation? Accurately predicting what customers want, need, and will pay for. Even if you ask them, they often can't explain what they want. Now, there's a breakthrough solution: Innovation Games. Drawing on his software product strategy and product management consulting experience, Luke Hohmann has created twelve games that help you uncover your customers' true, hidden needs and desires.


You'll learn what each game will accomplish, why it works, and how to play it with customers. Then, Hohmann shows how to integrate the results into your product development processes, helping you focus your efforts, reduce your costs, accelerate time to market, and deliver the right solutions, right from the start.




  • Learn how your customers define success




  • Discover what customers don't like about your offerings




  • Uncover unspoken needs and breakthrough opportunities




  • Understand where your offerings fit into your customers' operations




  • Clarify exactly how and when customers will use your product or service




  • Deliver the right new features, and make better strategy decisions




  • Increase empathy for the customers' experience within your organization




  • Improve the effectiveness of the sales and service organizations




  • Identify your most effective marketing messages and sellable features




Innovation Games will be indispensable for anyone who wants to drive more successful, customer-focused product development: product and R&D managers, CTOs and development leaders, marketers, and senior business executives alike.



About the Author

Luke Hohmann is the founder and CEO of Enthiosys, Inc., a Silicon Valley-based software product strategy and management consulting firm. Luke is also the author of Beyond Software Architecture: Creating and Sustaining Winning Solutions and Journey of the Software Professional: A Sociology of Software Development. Luke graduated magna cum laude with a B.S.E. in computer engineering and an M.S.E in computer science and engineering from the University of Michigan. While at Michigan he studied cognitive psychology and organizational behavior in addition to data structures and artificial intelligence. He is a former National Junior Pairs Figure Skating Champion and American College of Sports Medicine certified aerobics instructor. A member of the PDMA, ACM, and IEEE, in his spare time he enjoys roughhousing with his four kids, his wife’s cooking, and long runs in the Santa Cruz mountains (because he really does enjoy his wife’s cooking).

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Innovation and Imagination at Work, 2nd Edition : 9780074714539

In this revised and expanded second edition of Innovation and Imagination at Work, the Australian Institute of Management presents the thoughts of leading management thinkers and practitioners on how to create innovative organizations.


From a management and leadership perspective, this best-selling business book examines:



  • what business leaders and managers need to know about the future

  • why innovation will be imperative for corporate survival

  • how to transform an organization into an innovative enterprise

  • which innovation strategies are right for your organization

  • how to generate a constant stream of new ideas

  • how to manage and harness the creative energies of employees

  • why all organizations need to become entrepreneurial.


Each self-contained chapter combines theory, real-life application and practical guidance, with take-aways for the manager to explore and employ in the workplace.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Innovate or Perish: Managing the Enduring Technology Company in the Global Market : 9780471779308

Essential reading for IP managers and corporate executives, Innovate or Perish is a new road map equipping readers with the principles and tools needed for their companies to compete in the emerging creativity economy. Edited by Edward Kahn, this seminal book includes contributions from seasoned intellectual property (IP) professionals—including Ed Walsh, Karl Jorda, Wayne Jaeschke, Abha Divine, and Damon Matteo.

Like it or not, the American business landscape has changed. While factors such as the rise in outsourcing, the impact of the Internet, and the convergence in communications have caused a wake-up call in the way American business designs and builds new products and services, U.S. companies still face a loss of competitive edge because of declining American dominance in scientific and technological brainpower. Going directly to the heart of why large companies fail to sustain innovation, Innovate or Perish offers practical, realistic solutions to this negative trend and confronts readers with the reality that the decision to survive or thrive lies in how corporate boardrooms view innovation and the largely invisible, yet massively influential, intangible economy.

Edited by Edward Kahn, this seminal book includes contributions from seasoned intellectual property (IP) professionals—including Ed Walsh, Karl Jorda, Wayne Jaeschke, Abha Divine, and Damon Matteo—offering expert advice based on their diverse experiences working with companies such as Boeing, Dow, DuPont, Xerox, PARC, Hewlett-Packard, Pitney Bowes, Ciba-Geigy, and more.


Highly readable and clearly written, Innovate or Perish helps readers unleash the innovative potential of their company's ideas with thought-provoking discussion and strategies on:



  • Why the global marketplace is here to stay

  • What they must do to survive and thrive in the global marketplace

  • How to build and integrate IP management into a company's long-term strategic plan

  • How to maximize business value from intellectual property

  • The best practices for strategic IP management


Essential reading for IP managers and corporate executives, Innovate or Perish is a new road map equipping readers with the principles and tools needed for their companies to compete in this emerging creativity economy.

About the Author


EDWARD KAHN is founder and President of EKMS, Inc., an intellectual property management firm established in 1986 and based in Cambridge, Massachusetts. EKMS helps companies realize the full commercial value of their patents and technologies.? Edward's main areas of expertise are technology assessment and deal making. EKMS clients include the world's leading computer, automotive, aerospace life sciences, and chemical manufacturers such as Boeing, Pharmacia, DuPont, and IBM Corporation, as well as smaller corporations, universities, and individual inventors. He is frequently asked to write and comment on intellectual property topics in the business and trade press, and at conferences and forums around the country.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Innocent Code : A Security Wake-Up Call for Web Programmers : 9780470857441

This book is an entertaining read, that shows how to change your mindset from website construction to website destruction so as to avoid writing dangerous code.

This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where code may be exploited to gain access to--or break --systems, but without delving into specific architectures, programming or scripting languages or applications. It provides illustrations with real code.


Innocent Code is an entertaining read showing how to change your mindset from website construction to website destruction so as to avoid writing dangerous code. Abundant examples from susceptible sites will bring the material alive and help you to guard against:



  • SQL Injection, shell command injection and other attacks based on mishandling meta-characters

  • bad input

  • cross-site scripting

  • attackers who trick users into performing actions

  • leakage of server-side secrets

  • hidden enemies such as project deadlines, salesmen, messy code and tight budgets


All web programmers need to take precautions against producing websites vulnerable to malicious attack. This is the book which tells you how without trying to turn you into a security specialist.


About the Author


Sverre Huseby runs his own company selling courses and consultancy services in Web application security. He's an active participant on webappsec mail forum.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inhabited Information Spaces: Living with your Data : 9781852337285

In this book you will find some examples of work in particular from the Inhabited Information Spaces Grouping. It is interesting to see how some of these ideas are still “futuristic” and others have started to become part of mainstream thinking and made their way into products.

Some people say that you can find “grains of the future” in the present today – the only problem is, where do you start to look? One of the potential advantages of this book is that by looking at the research developments stretching out into recent past, one can identify how some grains developed into trends of the present, and other are still just emerging.

For those still interested in seeking out “grains of the future”, this book will be a valuable source.


Jakub Wejchert
Information Society DG

European Commission


Starting from the time of the ENIAC, one of the colossal computers of the 1940s, most IT progress has been driven from the point of view of the machine. Since then things have changed – but perhaps not really that much. Even if computers can today calculate many times over what was possible a few years ago, and the machines have become somewhat less obtrusive, much of the “mind set” has stayed the same. It is the visions of huge calculating machines spanning massive rooms, trying to recreate an absolute artificial intelligence, that still haunt much of the thinking of today.

Alternatives to the idea of fitting computing into ever smaller boxes can mainly be attributed to Mark Weiser. In his paper, “The Computer for the 21st Century”, he outlined notions of how computing could become integrated into the fabric of everyday life by becoming completely distributed into the environment. In this way computing would become “ubiquitous”. More recently, similarly inspired work on “tangible media”, by Hiroshi Ishii has emerged from the MIT Media Lab. Apart from this, the technological revolution of GSM and the mobile phone has also had its share of making information technology come out of its “traditional shell”.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul : 9781597490115

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field


Do you analyze every packet that crosses your home network just because you can? Do you spend countless hours coding applications for the sheer joy and challenge? Do you have a coin jar labeled “Trip to DEFCON/Black Hat Fund”? If you want to refine those skills to land a top InfoSec job and employer-funded trip to Vegas next year, you’ve come to the right place. The authors of this book have all succeeded in applying their inherent hacker skills to build successful InfoSec careers. From them you will learn about the variety of available jobs and the skills required to excel in each one. Also, the authors provide advice on how to develop the necessary management and personal skills required to hack your way to the top.




· Determine What You Want to Be When You Grow Up (or at Least Get Older)
See how the InfoSec field has matured, and decide if this is the life for you.


· Social Engineering for Profit
Use both your people and research skills to perform reconnaissance on the InfoSec job market.


· Choose the Right Path
Learn what certifications, work experience, and education are required (or not) to land your dream job.


· There’s No Place Like Home…for a Test Lab!
Build a fully functional test lab and attack machine in your basement to fine-tune both your attack and defense skills.


· Learn the Laws of Security
Master the ten guiding principles of information security to outwit malicious hackers in the real world.


· Know Your Enemies
Identify and understand the classes of attack: denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, elevation of privileges.


· Feeling Vulnerable?
Navigate the dangerous waters of vulnerability disclosure from nondisclosure to full disclosure.


· Don’t Trip the Sensors
Use your l337 H4x0r skillz to assimilate into the workplace and hack the corporate ladder.


· Master Incident Response
Develop contingency plans to put out fires in the workplace without getting burned.


· Install Your Career Rootkit
Since you got there, you might as well stay there!

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Visualization, Second Edition: Perception for Design (The Morgan Kaufmann Series in Interactive Technologies) : 9781558608191

"This unique and essential guide to human visual perception and related cognitive principles will enrich courses on information visualization and empower designers to see their way forward. Ware's updated review of empirical research and interface design examples will do much to accelerate innovation and adoption of information visualization."
Ben Shneiderman, University of Maryland

"Colin Ware is the perfect person to write this book, with a long history of prominent contributions to the visual interaction with machines and to information visualization directly. It goes a long way towards joining science to the practical design of information visualization systems."
from the foreword by Stuart Card, PARC

Most designers know that yellow text presented against a blue background reads clearly and easily, but how many can explain why, and what really are the best ways to help others and ourselves clearly see key patterns in a bunch of data? When we use software, access a web site, or view graphics, our understanding is greatly enhanced or impeded by the way information is presented. By explaining in detail how we think visually, this book provides guidance on how to construct effective interactive information displays.

This book combines a strictly scientific approach to human perception with a practical concern for the rules governing the effective visual presentation of information. Surveying the research of leading psychologists and neurophysiologists, author Colin Ware isolates key principles at work in vision and perception, and from them derives specific and effective visualization techniques suitable for a wide range of scenarios. Information Visualization offers practical guidelines that can be applied by anyone, and covers all facets of visual perception: color, organization, space perception, motion, and texture.

* Major revision of this classic work, with a new chapter on visual thinking, new sections on face perception and flow visualization, an appendix on how to evaluate visualizations,and a greatly expanded chapter on color and color sequences.

*New to this edition is the full-color treatment throughout, to better display over 400 illustrations.

*From a leading researcher in the field of human perception who has brought together, in a single resource, all current scientific insight into the question of data visualization.

About the Author
The author takes the "visual" in visualization very seriously. Colin Ware has advanced degrees in both computer science (MMath, Waterloo) and the psychology of perception (Ph.D., Toronto). He has published over a hundred articles in scientific and technical journals and at leading conferences, many of which relate to the use of color, texture, motion, and 3D in information visualization. In addition to his research, Professor Ware also builds useful visualization software systems. He has been involved in developing 3D interactive visualization systems for ocean mapping for over twelve years, and he directed the development of the NestedVision3D system for visualizing very large networks of information. Both of these projects led to commercial spin-offs. Professor. Ware recently moved from the University of New Brunswick in Canada to direct the Data Visualization Research Laboratory at the University of New Hampshire.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Visualization: Beyond the Horizon : 9781846283406

Information visualization is not only about creating graphical displays of complex and latent information structures; it contributes to a broader range of cognitive, social, and collaborative activities. This is the first book to examine information visualization from this perspective.


This 2nd edition continues the unique and ambitious quest for setting information visualization and virtual environments in a unifying framework. Information Visualization: Beyond the Horizon pays special attention to the advances made over the last 5 years and potentially fruitful directions to pursue. It is particularly updated to meet the need for practitioners. The book is a valuable source for researchers and graduate students. This new edition is forwarded by Ben Shneiderman, University of Maryland.


Key features:



  • Latest advances in information visualization.

  • Applications of information visualization, including knowledge domain visualization, knowledge diffusion, and social networks.

  • Detecting topics, emergent trends, and abrupt changes.

  • Empirical findings concerning information visualization.

  • Virtual environments and collaborative virtual environments.


Chaomei Chen is an Associate Professor in the College of Information Science and Technology at Drexel University, Philadelphia, USA. He is the author of Mapping Scientific Frontiers: The Quest for Knowledge Visualization (Springer, 2003).

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Theory, Inference and Learning Algorithms : 9780521642989

"...a valuable reference...enjoyable and highly useful." American Scientist

"...an impressive book, intended as a class text on the subject of the title but having the character and robustness of a focused encyclopedia. The presentation is finely detailed, well documented, and stocked with artistic flourishes." Mathematical Reviews

"Essential reading for students of electrical engineering and computer science; also a great heads-up for mathematics students concerning the subtlety of many commonsense questions." Choice

"An utterly original book that shows the connections between such disparate fields as information theory and coding, inference, and statistical physics." Dave Forney, Massachusetts Institute of Technology

"This is an extraordinary and important book, generous with insight and rich with detail in statistics, information theory, and probabilistic modeling across a wide swathe of standard, creatively original, and delightfully quirky topics. David MacKay is an uncompromisingly lucid thinker, from whom students, faculty and practitioners all can learn." Peter Dayan and Zoubin Ghahramani, Gatsby Computational Neuroscience Unit, University College, London

"An instant classic, covering everything from Shannon's fundamental theorems to the postmodern theory of LDPC codes. You'll want two copies of this astonishing book, one for the office and one for the fireside at home." Bob McEliece, California Institute of Technology

"An excellent textbook in the areas of infomation theory, Bayesian inference and learning alorithms. Undergraduate and post-graduate students will find it extremely useful for gaining insight into these topics." REDNOVA

Information theory and inference, often taught separately, are here united in one entertaining textbook. These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to clustering, convolutional codes, independent component analysis, and neural networks. The final part of the book describes the state of the art in error-correcting codes, including low-density parity-check codes, turbo codes, and digital fountain codes -- the twenty-first century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, David MacKay's groundbreaking book is ideal for self-learning and for undergraduate or graduate courses. Interludes on crosswords, evolution, and sex provide entertainment along the way. In sum, this is a textbook on information, communication, and coding for a new generation of students, and an unparalleled entry point into these subjects for professionals in areas as diverse as computational biology, financial engineering, and machine learning.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Theory and Reliable Communication : 9780471290483

This book is designed primarily for use as a first-year graduate text in information theory, suitable for both engineers and mathematicians. It is assumed that the reader has some understanding of freshman calculus and elementary probability, and in the later chapters some introductory random process theory. Unfortunately there is one more requirement that is harder to meet. The reader must have a reasonable level of mathematical maturity and capability for abstract thought. The major results of the theory are quite subtle and abstract and must sometimes be arrived at by what appears to be rather devious routes. Fortunately, recent simplifications in the theory have made the major results more accessible than in the past.

Because of the subtlety and abstractness of the subject, it is necessary to be more rigorous than is usual in engineering. I have attempted to soften this wherever possible by preceding the proof of difficult theorems both with some explanation of why the theorem js important and with an intuitive explanation of why it is true. An attempt has also been made to provide the simplest and most elementary proof of each theorem, and many of the proofs here are new. l have carefully avoided the rather obnoxious practice in many elementary textbooks of quoting obscure mathematical theorems in the middle of a proof to make it come out right.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Technology: Selected Tutorials (IFIP International Federation for Information Processing) : 9781402081583

This book contains a selection of tutorials on hot topics in information
technology, which were presented at the IFIP 18th World Computer
Congress. WCC2004 took place at the Centre de Congrès Pierre Baudis, in
Toulouse, France, from 22 to 27 August 2004.

The 11 chapters included in the book were chosen from tutorials
proposals submitted to WCC2004. These papers report on several important
and state-of-the-art topics on information technology such as:

Quality of Service in Information Networks
Risk-Driven Development of Security-Critical Systems Using UMLsec
Developing Portable Software
Formal Reasoning About Systems, Software and Hardware Using
Functionals, Predicates and Relations
The Problematic of Distributed Systems Supervision
Software Rejuvenation - Modeling and Analysis
Test and Design-for-Test of Mixed-Signal Integrated Circuits
Web Services
Applications of Multi-Agent Systems
Discrete Event Simulation
Human-Centered Automation

We hereby would like to thank IFIP and more specifically WCC2004
Tutorials Committee and the authors for their contribution. We also would
like to thank the congress organizers who have done a great job.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Technology Security: Advice from Experts (IT Solutions) : 9781591402473

As the value of the information portfolio has increased, IT security has changed from a product focus to a business management process. Today, IT security is not just about controlling internal access to data and systems but managing a portfolio of services including wireless networks, cyberterrorism protection and business continuity planning case of disaster.


With this new perspective, the role of IT executives has changes from protecting against external threats to building trusted security infrastructures linked to business processes driving financial returns. As technology continues to expand in complexity, databases increase in value, and as information privacy liability broadens exponentially, security processes developed during the last century will not work. And in the context of the 9/11 attacks, IT leaders must prepare their organizations for previously unimagined situations. IT security has become both a necessary service and a business revenue opportunity. Balancing both perspectives requires a business portfolio approach to managing investment with income, user access with control, and trust with authentication. This book is a collection of interviews of corporate IT security practitioners offering various viewpoints on successes and failures in managing IT security in organizations.


About the Author


Lawrence M. Oliva is director of Infrastructure Project Management for the CSC PRIME Alliance Project, which is focused on modernizing many of the U.S. Treasury Department’s communications and computing infrastructure. He has more than 25 years of experience with information security practices and procedures from both the technical and executive management perspectives, and has implemented many of the security management best practices mentioned in this book. As a certified project management professional (PMP), Oliva has managed several extraordinarily high-risk, mission-critical projects up to $160 million in budget. As vice president for a computer security firm developing biometric security solutions, his team developed and delivered procedures to quickly, securely and inexpensively migrate hundreds of financial and health care IT users from password-only conditions to multi-factor, high security biometric access environments. He is a faculty member at the University of Phoenix.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Technology Project Management : 9780471392033

Welcome to Information Technology Project Management—Providing Measurable
Organizational Value. This book was written to help people understand the processes,
tools, techniques, and areas of knowledge needed to successfully manage information
technology (IT) projects.

The idea of project management has been around for a long, long time. In fact, it
was around before the great pyramids of Egypt were created. Today, project management
has emerged as its own field, supported by a body of knowledge and research
across many disciplines. Although still relatively new, the fields of Management
Information Systems (MIS) and Software Engineering have their own bodies of
knowledge that include various tools, techniques, and methods supported by a continually
growing base of research.

Unfortunately, the track record for IT projects has not been as successful as one
might expect, although the situation appears to be improving. One reason for this
improvement has been a greater focus on a project management approach to support
the activities required to develop and deliver information systems. Just as building a
system is more than sitting down in front of a computer and writing code, project
management is more than just creating fancy charts or diagrams using one of the more
popular project management software packages.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Technology Outsourcing Transactions: Process, Strategies, and Contracts : 9780471459491

An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have discovered the advantages of outsourcing information technology services. But turning your IT resources over to an outside vendor can be a complicated and intimidating process, involving software licensing and development agreements, sales of tangible and intangible assets, human resources management, and more.


Information Technology Outsourcing Transactions provides detailed information and expert guidance on outsourcing IT services. Written by the team that put together some of the biggest outsourcing deals of recent years, it walks you through the entire process, from determining requirements, analyzing benefits, and setting objectives, to selecting a vendor, structuring a deal, and managing vendor relations. The authors examine all the relevant technical, financial, strategic, legal, and human resources issues and respond to critical questions with clear, practical solutions. A wealth of forms, checklists, sample documents, and other tools—on an IBM compatible diskette—makes structuring, negotiating, and closing an outsourcing deal easier than ever. --This text refers to an out of print or unavailable edition of this title.

About the Author
John K. Halvey is a partner in the New York office of the international law firm of Milbank, Tweed, Hadley & McCloy, LLP and the founder of the Technology & Strategic Sourcing Group. He practices in all areas of technology and sourcing law, with particular emphasis on information technology and business process outsourcing and private equity transactions involving technology or sourcing companies. Mr. Halvey has represented companies in many of the largest technology, telecommunications, and business process outsourcing transactions, including Deutsche Bank, BellSouth, Panasonic, DuPont, AT&T, Alcatel, Xerox, Boeing, Bombardier, General Atlantic, and the Commonwealth Bank of Australia.


Barbara M. Melby is a partner in the Global Outsourcing Group. Ms. Melby's practice focuses primarily on outsourcing transactions, including information technology and business process outsourcing, as well as other technology-related transactions, including development agreements, system implementation agreements, licensing and hosting agreements, technology services, joint ventures, and strategic alliances. Ms. Melby represents a large and diverse client base and has led or participated in nearly 100 major outsourcing transactions. Most recently she has completed a large offshore outsourcing transaction for a major insurance company, a global IT outsourcing (ITO) transaction for a leading international media company, a multi-tower outsourcing transaction for a major global pharmaceutical company, and a human resources outsourcing (HRO) transaction for large services provider. In addition to this book, Ms. Melby has co-authored Business Process Outsourcing: Process, Strategies, and Contracts (John Wiley& Sons, 2000). 

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Technology in Languages for Specific Purposes: Issues and Prospects (Educational Linguistics) : 9780387285955

Work in the field of Languages for Specific Purposes (LSP) has also been transformed by technology. This volume offers an overview of a variety of applications of IT in the field of LSP. It is addressed to a wide audience that includes LSP teachers and researchers, although the contents may also be relevant to applied linguists working in other fields. This book contains research studies as well as educational experiences and proposals, presented from different perspectives and backgrounds (both geographical and cultural), all of which are theoretically grounded and with a clear and sound rationale. Readers will find a variety of educational projects and research studies situated in specific educational contexts and in particular geographical locations. Although not intended for generalization, we believe they are valuable technology-based educational solutions that can offer new insight and reflections that may help readers create their own tools and carry out further research. The chapters cover the main areas of research and practice in the field.

About the Author

The editors of the volume have ample experience teaching LSP at Universitat Politècnica de Catalunya. They have been involved in materials writing, in educational projects and in research related to LSP and, more specifically, to the impact of IT on LSP. English for Academic Purposes: Learning English through the Web (2001) and A Reading Course for Computing (2001) are among the most recent textbooks developed by the authors of the volume proposed here. The authors are currently developing an IT-based project funded by Universitat Politècnica de Catalunya (2000), which consists in creating a virtual environment with learning resources for technical students of English. They received an award for an innovative teaching experience which involves the use of IT in LSP in 2001. In addition, the authors have also published several articles directly related to the scope of the volume.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities : 9780309087360

Immediately following the events of September 11, 2001, the National Academies (including the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council) offered its services to the nation to formulate a scientific and technological response to the challenges posed by emerging terrorist threats that would seek to inflict catastrophic damage on the nation’s people, its infrastructure, or its economy. Specifically, it supported a project that culminated in a report entitled Making the Nation Safer: The Role of Science and Technology in Countering Terrorism (The National Academies Press, Washington, D.C.) that was released on June 25, 2002. That project, chaired by Lewis M. Branscomb and Richard D. Klausner, sought to identify current threats of catastrophic terrorism, understand the most likely vulnerabilities in the face of these threats, and identify highly leveraged opportunities for contributions from science and technology to counterterrorism in both the near term and the long term.

Taking the material on information technology contained in Making the Nation Safer as a point of departure, the Committee on the Role of Information Technology in Responding to Terrorism, identical to the Panel on Information Technology that advised the Branscomb-Klausner committee, drew on sources, resources, and analysis unavailable to that committee during the preparation of its report. In addition, the present report contains material and elaborations that the Branscomb-Klausner committee did not have time to develop fully for the parent report. Both reports are aimed at spurring research in the science and technology communities to counter and respond to terrorist acts such as those experienced on September 11.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Technology and Lawyers: Advanced Technology in the Legal Domain, from Challenges to Daily Routine : 9781402041457

The area of Information Technology and Lawyers is a fascinating one. Both from a practical and an academic perspective the opportunities of applying Information Technology to law are tremendous. At the same time, however, lawyers are amongst the most conservative professionals, and traditional late adapters of technology. Nowadays the gap between Information Technology and Lawyers is closing more and more, in particular due to the Internet and the richness of legal sources that can be found online. This book provides material to further bridge the gap by showing people with a legal background what is possible with Information Technology now and in the near future, as well as by showing people with an IT background what opportunities exist in the domain of law. Any lawyer should read this book about the current practice of IT in the legal domain, and what is to be expected in the near future. The book is meant for both practitioners and academics, and can serve in any (post)graduate courses on computer science, law, business, etc.

About the Author

The editors Arno R. Lodder and Anja Oskamp are both affiliated to the Computer/Law Institute of the Vrije Universiteit Amsterdam, and before co-edited books on IT support of the Judiciary, as well as the first two editions of the Dutch handbook on IT & Lawyers.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google