ReadingsWeek2 - ...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html SYSTEM ""> <html xmlns=""> <head> <title>Readings: Week 2</title> </head> <body> <h1>Readings: Week 2</h1> <h2>Required</h2> <p>To the extent possible, please complete these readings prior to the class day for which they are assigned.</p> <h3>Day 1</h3> <ul> <li>Comer: Chapters 7, 12, 13, 15, 16, 18, 19, & 20</li> <li>Meyers: Chapter 15</li> <li>Hallberg: Chapters 1-7</li> </ul> <h3>Day 2</h3> <ul> <li>Comer: Chapters 17, 24</li> </ul> <h3>Day 3 & 4</h3> <ul> <li>Comer: Chapters 14, 31-33</li> <li>Hallberg: Chapters 10 & 11</li> <li><a href=""> Security Absurdity: The Complete, Unquestionable, And Total Failure of Information Security. </a> by Noam Eppel </li> <li><a href="">The Trouble Within</a> By Wayne Rash, March 28, 2003 in InfoWorld
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/09/2010 for the course GSLIS LIS451 taught by Professor Martinwolske during the Summer '08 term at University of Illinois at Urbana–Champaign.

Page1 / 2

ReadingsWeek2 - ...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online