4 | -- | 6 | Keith W. Miller, Jeffrey M. Voas. Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are? |
7 | -- | 9 | Brandi Ortega. News Briefs |
10 | -- | 12 | Ed Zintel. Resources |
14 | -- | 19 | C. Derrick Huang, Ravi S. Behara, Qing Hu. Managing Risk Propagation in Extended Enterprise Networks |
20 | -- | 25 | Faith M. Heikkila. E-Discovery: Identifying and Mitigating Security Risks during Litigation |
26 | -- | 33 | Wolf Zimmer, Thomas Langkabel, Carsten Hentrich. ArchiSafe: Legally Compliant Electronic Storage |
34 | -- | 38 | Khalil A. Abuosba, Asim A. El-Sheikh. Formalizing Service-Oriented Architectures |
39 | -- | 45 | Peng Xu, Balasubramaniam Ramesh. Using Process Tailoring to Manage Software Development Challenges |
46 | -- | 52 | Vikas Dewangan. Effectively Managing Proposal Development in the IT Services World |
54 | -- | 55 | Todd W. Kolb. The Ingredients of Successful IT Management and Governance |
56 | -- | 62 | Liguo Yu, Srini Ramaswamy, John Bush. Symbiosis and Software Evolvability |
64 | -- | 0 | Linda Wilbanks. Email Refresher: Defending against the Slow Slide toward Inefficiency |