Communications of the ACM, Volume 57

Refine list

showing all ?? records

Volume 57, Number 1, January 2014

From the president Letters to the Editor BLOG@CACM News Technology strategy and management Law and technology Historical reflections The business of software Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 2, February 2014

Letter from Chair of Education Board Letter from the President Letters to the Editor BLOG@CACM News Privacy and security Education Inside risks Kode vicious Economic and business dimensions Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 3, March 2014

Letter from the President Letters to the Editor BLOG@CACM News Legally speaking Computing ethics The profession of IT Broadening participation Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 4, April 2014

From the President Letters to the Editor BLOG@CACM News Technology strategy and management Global computing Kode Vicious Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 5, May 2014

From the president Letters to the Editor BLOG@CACM News Economic and business dimensions Law and technology Historical reflections Education Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 6, June 2014

Letter from the President Letters to the Editor BLOG@CACM News Inside risks The business of software Privacy and security The profession of IT Kode Vicious Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 7, July 2014

Letters to the Editor BLOG@CACM News Legally speaking Computing ethics Technology strategy and management Broadening participation Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 8, August 2014

BLOG@CACM News Privacy and security Education Global computing Kode Vicious Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 9, September 2014

Letters to the Editor BLOG@CACM News Law and technology Historical reflections The profession of IT Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 10, October 2014

Letters to the Editor BLOG@CACM News Technology strategy and management Inside risks Kode vicious The business of software Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 11, November 2014

Letters to the Editor BLOG@CACM News Economic and business dimensions Legally speaking Computing ethics Education Privacy and security Viewpoint Practice Contributed articles Review articles Research highlights Last byte

Volume 57, Number 12, December 2014

Letters to the Editor BLOG@CACM News Global computing The profession of IT Broadening participation Kode vicious Viewpoint Practice Contributed articles Review articles Research highlights Last byte
a service of  Schloss Dagstuhl - Leibniz Center for Informatics