

Publisher: OECD Publishing
ISSN: 1608-0270
Source: SourceOECD Science & Information Technology, Vol.2009, Iss.2, 2009-02, pp. : 54-83
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Malware: Why Should We Be Concerned?
SourceOECD Science & Information Technology, Vol. 2009, Iss. 2, 2009-02 ,pp. :




Why don’t they practice what we preach?
Annals of Software Engineering, Vol. 6, Iss. 1-4, 1998-01 ,pp. :


Why Is the AAP Waging War on Librarians?
The Charleston Advisor, Vol. 2, Iss. 4, 2001-04 ,pp. :