Technological turf wars: a case study of the computer antivirus industry
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Philadelphia
Temple University Press
2009
|
Schlagworte: | |
Beschreibung: | 222 p. 21 cm |
ISBN: | 9781592138814 1592138810 9781592138821 1592138829 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044840564 | ||
003 | DE-604 | ||
005 | 20180305 | ||
007 | cr|uuu---uuuuu | ||
008 | 180305s2009 |||| o||u| ||||||eng d | ||
020 | |a 9781592138814 |c cloth : alk. paper |9 978-1-59213-881-4 | ||
020 | |a 1592138810 |c cloth : alk. paper |9 1-59213-881-0 | ||
020 | |a 9781592138821 |c pbk. : alk. paper |9 978-1-59213-882-1 | ||
020 | |a 1592138829 |c pbk. : alk. paper |9 1-59213-882-9 | ||
035 | |a (ZDB-38-ESG)ebr10279967 | ||
035 | |a (OCoLC)317147295 | ||
035 | |a (DE-599)BVBBV044840564 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Johnston, Jessica R. |d 1952- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Technological turf wars |b a case study of the computer antivirus industry |c Jessica Johnston |
264 | 1 | |a Philadelphia |b Temple University Press |c 2009 | |
300 | |a 222 p. |c 21 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Includes bibliographical references (p. [213]-217) and index | |
505 | 8 | |a Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power | |
650 | 4 | |a Computer software industry |x Social aspects |z United States |v Case studies | |
650 | 4 | |a Computer software industry |x Moral and ethical aspects |z United States |v Case studies | |
650 | 4 | |a Computer security |x Social aspects |z United States |v Case studies | |
650 | 4 | |a Computer security |x Moral and ethical aspects |z United States |v Case studies | |
650 | 4 | |a Organizational behavior |z United States |v Case studies | |
650 | 4 | |a Business ethics |z United States |v Case studies | |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-59213-881-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 1-59213-881-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-59213-882-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-59213-882-9 |
912 | |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030235427 |
Datensatz im Suchindex
_version_ | 1804178348717375488 |
---|---|
any_adam_object | |
author | Johnston, Jessica R. 1952- |
author_facet | Johnston, Jessica R. 1952- |
author_role | aut |
author_sort | Johnston, Jessica R. 1952- |
author_variant | j r j jr jrj |
building | Verbundindex |
bvnumber | BV044840564 |
collection | ZDB-38-ESG |
contents | Includes bibliographical references (p. [213]-217) and index Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power |
ctrlnum | (ZDB-38-ESG)ebr10279967 (OCoLC)317147295 (DE-599)BVBBV044840564 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02233nmm a2200469zc 4500</leader><controlfield tag="001">BV044840564</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180305 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180305s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781592138814</subfield><subfield code="c">cloth : alk. paper</subfield><subfield code="9">978-1-59213-881-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1592138810</subfield><subfield code="c">cloth : alk. paper</subfield><subfield code="9">1-59213-881-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781592138821</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">978-1-59213-882-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1592138829</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">1-59213-882-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-ESG)ebr10279967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)317147295</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044840564</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johnston, Jessica R.</subfield><subfield code="d">1952-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Technological turf wars</subfield><subfield code="b">a case study of the computer antivirus industry</subfield><subfield code="c">Jessica Johnston</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Philadelphia</subfield><subfield code="b">Temple University Press</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">222 p.</subfield><subfield code="c">21 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references (p. [213]-217) and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software industry</subfield><subfield code="x">Social aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software industry</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Social aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Organizational behavior</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business ethics</subfield><subfield code="z">United States</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-59213-881-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">1-59213-881-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-59213-882-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-59213-882-9</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030235427</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV044840564 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:02:33Z |
institution | BVB |
isbn | 9781592138814 1592138810 9781592138821 1592138829 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030235427 |
oclc_num | 317147295 |
open_access_boolean | |
physical | 222 p. 21 cm |
psigel | ZDB-38-ESG |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Temple University Press |
record_format | marc |
spelling | Johnston, Jessica R. 1952- Verfasser aut Technological turf wars a case study of the computer antivirus industry Jessica Johnston Philadelphia Temple University Press 2009 222 p. 21 cm txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. [213]-217) and index Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power Computer software industry Social aspects United States Case studies Computer software industry Moral and ethical aspects United States Case studies Computer security Social aspects United States Case studies Computer security Moral and ethical aspects United States Case studies Organizational behavior United States Case studies Business ethics United States Case studies (DE-588)4522595-3 Fallstudiensammlung gnd-content Erscheint auch als Druck-Ausgabe, Hardcover 978-1-59213-881-4 Erscheint auch als Druck-Ausgabe, Hardcover 1-59213-881-0 Erscheint auch als Druck-Ausgabe, Paperback 978-1-59213-882-1 Erscheint auch als Druck-Ausgabe, Paperback 1-59213-882-9 |
spellingShingle | Johnston, Jessica R. 1952- Technological turf wars a case study of the computer antivirus industry Includes bibliographical references (p. [213]-217) and index Naming the threat -- Security transformations -- Trust, networks and the transformation of organizational power -- IT corporate customers as end users -- Marketing service -- Situated exclusions and reinforced power Computer software industry Social aspects United States Case studies Computer software industry Moral and ethical aspects United States Case studies Computer security Social aspects United States Case studies Computer security Moral and ethical aspects United States Case studies Organizational behavior United States Case studies Business ethics United States Case studies |
subject_GND | (DE-588)4522595-3 |
title | Technological turf wars a case study of the computer antivirus industry |
title_auth | Technological turf wars a case study of the computer antivirus industry |
title_exact_search | Technological turf wars a case study of the computer antivirus industry |
title_full | Technological turf wars a case study of the computer antivirus industry Jessica Johnston |
title_fullStr | Technological turf wars a case study of the computer antivirus industry Jessica Johnston |
title_full_unstemmed | Technological turf wars a case study of the computer antivirus industry Jessica Johnston |
title_short | Technological turf wars |
title_sort | technological turf wars a case study of the computer antivirus industry |
title_sub | a case study of the computer antivirus industry |
topic | Computer software industry Social aspects United States Case studies Computer software industry Moral and ethical aspects United States Case studies Computer security Social aspects United States Case studies Computer security Moral and ethical aspects United States Case studies Organizational behavior United States Case studies Business ethics United States Case studies |
topic_facet | Computer software industry Social aspects United States Case studies Computer software industry Moral and ethical aspects United States Case studies Computer security Social aspects United States Case studies Computer security Moral and ethical aspects United States Case studies Organizational behavior United States Case studies Business ethics United States Case studies Fallstudiensammlung |
work_keys_str_mv | AT johnstonjessicar technologicalturfwarsacasestudyofthecomputerantivirusindustry |