Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 1–10 of 276 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Ethical Hacking and Penetration Testing Guide

    By Rafay Baloch

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking...

    Published July 27th 2014 by Auerbach Publications

  2. Official (ISC)2® Guide to the CCFP CBK

    Edited by Peter Stephenson

    Series: (ISC)2 Press

    Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has—requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis. The Certified Cyber Forensics Professional (CCFPSM) designation ensures that...

    Published July 23rd 2014 by Auerbach Publications

  3. Social Media, Politics and the State

    Protests, Revolutions, Riots, Crime and Policing in the Age of Facebook, Twitter and YouTube

    Edited by Daniel Trottier, Christian Fuchs

    Series: Routledge Research in Information Technology and Society

    This book is the essential guide for understanding how state power and politics are contested and exercised on social media. It brings together contributions by social media scholars who explore the connection of social media with revolutions, uprising, protests, power and counter-power, hacktivism...

    Published July 22nd 2014 by Routledge

  4. Military Ethics and Emerging Technologies

    Edited by Timothy J. Demy, George R. Lucas Jr., Bradley J. Strawser

    This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. Although the nature and politics of war never change, the weapons and technologies used in war do change and are always undergoing development. Because of that, the arsenal of weapons...

    Published June 25th 2014 by Routledge

  5. Wireless Multimedia Communication Systems

    Design, Analysis, and Implementation

    By K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

    Published June 23rd 2014 by CRC Press

  6. Perspectives on Information

    Edited by Magnus Ramage, David Chapman

    Series: Routledge Studies in Library and Information Science

    Information is everywhere, and defines everything in today's society. Moreover, information is a key concept in a wide range of academic disciplines, from quantum physics to public policy. However, these disciplines all interpret the concept in quite different ways. This book looks at information...

    Published June 14th 2014 by Routledge

  7. The Frugal CISO

    Using Innovation and Smart Approaches to Maximize Your Security Posture

    By Kerry Ann Anderson

    If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security...

    Published May 18th 2014 by Auerbach Publications

  8. PCI Compliance

    The Definitive Guide

    By Abhay Bhargav

    Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide...

    Published May 4th 2014 by Auerbach Publications

  9. Security without Obscurity

    A Guide to Confidentiality, Authentication, and Integrity

    By J.J. Stapleton

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

    Published May 1st 2014 by Auerbach Publications

  10. Conducting Network Penetration and Espionage in a Global Environment

    By Bruce Middleton

    When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

    Published April 27th 2014 by Auerbach Publications