[Online library] Technological Turf Wars: A Case Study of the Computer Antivirus Industry






 | #5612873 in Books |  2008-11-28 | Original language:English | PDF # 1 |  8.25 x.60 x5.50l,.59 | File Name: 1592138829 | 232 pages


||2 of 2 people found the following review helpful.| A Great Peek Into the Industry|By Justin C. Klein Keane|I found Technological Turf Wars to be an engaging and revealing look into the anti-virus (AV) industry. While I expected the book to contain more details on AV or malware from a technical standpoint, I still found it was a great read. The book exposes many of the industry paradigms and idiosyncrasies. It also highlight| |
"Johnston presents the ways antivirus workers think in fascinating detail. She is very astute and effective in analyzing and explicating the underlying assumptions of their logic. Technological Turf Wars is insightful, interesting, and it unfolds in w

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.

Using a qualitative, interdisciplinary approach...


[PDF.qo30]  Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Rating: 3.58 (400 Votes)

Technological Turf Wars: A  Jessica R. Johnston epub
Technological Turf Wars: A  Jessica R. Johnston pdf
Technological Turf Wars: A  Jessica R. Johnston pdf download
Technological Turf Wars: A  Jessica R. Johnston review
Technological Turf Wars: A  Jessica R. Johnston summary
Technological Turf Wars: A  Jessica R. Johnston Free

You can specify the type of files you want, for your device.Technological Turf Wars: A Case Study of the Computer Antivirus Industry   |  Jessica R. Johnston. A good, fresh read, highly recommended.

Leman Don't Lose Your Shit!: Large Print Internet Password and ID Book (Large Print Address Book)
Astonishing Legends Learning Bitcoin
Kali Linux Web Penetration Testing Cookbook
SpamAssassin: A Practical Guide to Integration and Configuration
Advances in Cyber Security: Technology, Operations, and Experiences
Password notebook: Small internet address and password logbook / journal / diary - Peekaboo cat cover (Cat lover's notebooks)
Internet Password Organizer: Peace (Discreet Password Journal)
IT-Sicherheit 1.5: Internetprotokolle, Webprogrammierung, Systemsicherheit (German Edition)
Internet Password Organizer: An alphabetical journal to organize internet log-in details - Fuchsia cover
Cryptography and Network Security (4th Edition)
Personal Digital Security: Protecting Yourself from Online Crime
Astonishing Legends Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies
Astonishing Legends Raising Generation Tech: Preparing Your Children for a Media-Fueled World
Internet Password Organizer: An Internet Address and Password Organizer Journal (Best Internet Password Organizer Journal)
A Password Journal Organizer (An Internet Address and Password Journal): A Password Journal Organizer Internet Address Logbook / Diary / Notebook Birds (Volume 1)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
Information Warfare: Second Edition
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Password Keeper Your Personal Password Journal For Web Addresses, Passwords: Internet Addresses and More! Beautiful Orange Leaf
Computer viruses and related threats : a management guide
Leman The Ultimate HTML Reference
Password notebook: Large internet address and password logbook / journal / diary - French Mastiff cover (Dog lover's notebooks)
The Giant Black Book of Computer Viruses
Identity & Security: A Common Architecture & Framework For SOA and Network Convergence
The Internet Police: How Crime Went Online, and the Cops Followed
Leman The Healthy PC: Preventive Care, Home Remedies, and Green Computing, 2nd Edition
Automating Open Source Intelligence: Algorithms for OSINT (Computer Science Reviews and Trends)
Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)
Robotics + Human-Computer Interaction + Cryptography
Microsoft Office Professional 2013 for Touch Devices Plain & Simple
Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition)
Virtual Integrity: Faithfully Navigating the Brave New Web
Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition)
Internet Password Organizer: My Heart's Content (Discreet Password Journal)
Internet Password Logbook - Botanical Edition: Keep track of: usernames, passwords, web addresses in one easy & organized location
How to Cheat at Securing a Wireless Network
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
The Book of Zope
Leman Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training)
Above The Clouds: Managing Risk In The World Of Cloud Computing
Incident Response
SQL Server Forensic Analysis
Astonishing Legends Facing Cyber Threats Head On: Protecting Yourself and Your Business
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Applied Security Visualization
Cybersecurity and Applied Mathematics
Firewall Policies and VPN Configurations
Securing Your Digital World (A to eZ BooKs) (Volume 2)
Dot.cons
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Spam: A Shadow History of the Internet (Infrastructures)
Kid's Internet Password Book: Site Name, Url, Customer Svc #, hints and more (Internet Address Books)
The Pretext Playbook: Instruction Manual for Intentional Misleading Fabrication
Windows Internet Security: Protecting Your Critical Data
Cats: Password Organizer, Password Storage, Internet Address, Logbook, Diary, information, internet safety, Journal, Notebook, Directory, 5x8in small ... to store your information (personal safety)
iRules: What Every Tech-Healthy Family Needs to Know about Selfies, Sexting, Gaming, and Growing up
It's Never Done That Before: A Guide to Troubleshooting Windows XP
Professional ASP.NET 2.0 Security, Membership, and Role Management
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures
Information Security: Principles and Practices
Password Journal Logbook: Lock & Key, Alphabetical 5"x8" Password Keeper
Password Keeper: A Password Keeper Journal (Safe Password Keeper Journal)
Password notebook: Large internet address and password logbook / journal / diary - Curious horse cover (Horse lover's notebooks)
IPv6 Essentials
Management of Network Security
Internet Address & Password Log Journal
88 Privacy Breaches to Be Aware Of: Practical Data Protection Tips from Real-Life Experiences
The Giant Black Book
The Practice of Network Security: Deployment Strategies for Production Environments

Copyright Disclaimer:This site does not store any files on its server. We only index and link to content provided by other sites.

Home | DMCA | Contact Us | sitemap