000
|
|
camIa |
001
|
|
2210080679680 |
003
|
|
OCoLC |
005
|
|
20091211002045.0 |
006
|
|
m d |
007
|
|
cr cnu---unuuu |
008
|
|
090326s2009 pau sb 001 0 eng d |
020
|
|
▼a9781592138838 (electronic bk.) |
020
|
|
▼a1592138837 (electronic bk.) |
035
|
|
▼a(OCoLC)317147295 |
040
|
|
▼aN▼cN▼dYDXCP▼d221008 |
043
|
|
▼an-us--- |
050
|
|
▼aQA76.9.A25▼bJ57 2009eb |
082
|
|
▼a005.8▼222 |
100
|
|
▼aJohnston, Jessica R.,▼d1952- |
245
|
00 |
▼aTechnological turf wars▼h[electronic resource] :▼ba case study of the computer antivirus industry /▼cJessica Johnston. |
260
|
|
▼aPhiladelphia :▼bTemple University Press,▼c2009. |
300
|
|
▼a222 p. ;▼c21 cm. |
504
|
|
▼aIncludes bibliographical references (p. [213]-217) and index. |
505
|
|
▼aNaming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power. |
533
|
|
▼aElectronic reproduction.▼bBoulder, Colo. :▼cNetLibrary,▼d2009.▼nAvailable via World Wide Web.▼nAccess may be limited to NetLibrary affiliated libraries. |
650
|
|
▼aComputer software industry▼xSocial aspects▼zUnited States▼vCase studies. |
650
|
|
▼aComputer software industry▼xMoral and ethical aspects▼zUnited States▼vCase studies. |
650
|
|
▼aComputer security▼xSocial aspects▼zUnited States▼vCase studies. |
650
|
|
▼aComputer security▼xMoral and ethical aspects▼zUnited States▼vCase studies. |
650
|
|
▼aOrganizational behavior▼zUnited States▼vCase studies. |
650
|
|
▼aBusiness ethics▼zUnited States▼vCase studies. |
655
|
|
▼aElectronic books.▼2local |
710
|
|
▼aNetLibrary, Inc. |
776
|
|
▼cOriginal▼z9781592138814▼z1592138810▼z9781592138821▼z1592138829▼w(DLC) 2008012514▼w(OCoLC)213480219 |
856
|
|
▼3Bibliographic record display▼uhttp://www.netLibrary.com/urlapi.asp?action=summary&v=1&bookid=267635▼zAn electronic book accessible through the World Wide Web; click for information |
938
|
|
▼aYBP Library Services▼bYANK▼n2989378 |
994
|
|
▼a92▼bK4R |
999
|
|
▼z27931-51078 |