Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 1–10 of 304 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Technology and Human Development

    By Ilse Oosterlaken

    Series: The Routledge Human Development and Capability Debates

    This book introduces the capability approach – in which wellbeing, agency and justice are the core values – as a powerful normative lens to examine technology and its role in development. This approach attaches central moral importance to individual human capabilities, understood as effective...

    Published May 29th 2015 by Routledge

  2. Securing Systems

    Applied Security Architecture and Threat Models

    By Brook S. E. Schoenfield

    Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This...

    Published May 20th 2015 by CRC Press

  3. Fraud Examiners in White-Collar Crime Investigations

    By Petter Gottschalk

    In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime. He also presents a general theory regarding the economic, organizational, and behavioral dimensions of its perpetrators. Pool Your...

    Published May 20th 2015 by CRC Press

  4. Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition

    By Joseph Steinberg

    Series: (ISC)2 Press

    The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the...

    Published May 14th 2015 by Auerbach Publications

  5. Libr@ries

    Changing Information Space and Practice

    Edited by Cushla Kapitzke, Bertram C. Bruce

    This volume is the first to examine the social, cultural, and political implications of the shift from the traditional forms and functions of print-based libraries to the delivery of online information in educational contexts. Libr@ries are conceptualized as physical places, virtual spaces,...

    Published May 7th 2015 by Routledge

  6. Web Security

    A WhiteHat Perspective

    By Hanqing Wu, Liz Zhao

    In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security:...

    Published April 6th 2015 by Auerbach Publications

  7. EU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMP

    By Orlando Lopez

    Good Manufacturing Practice (GMP) ensures medicinal products are produced consistently and controlled to the quality standards appropriate for their intended use and as required by product specifications or marketing authorization. Annex 11 details the European Medicines Agency (EMA) GMP...

    Published April 6th 2015 by CRC Press

  8. Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

    Edited by Adam Gordon

    Series: (ISC)2 Press

    As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a...

    Published March 11th 2015 by Auerbach Publications

  9. Electronic Collaboration in Science

    Edited by Stephen H. Koslow, Michael F. Huerta

    Series: Progress in Neuroinformatics Research Series

    The increasingly sophisticated and powerful information technology we are creating plays an ever more prominent role in facilitating interaction and cooperation in everyday life. The time has come to harness it in the service of scientific research. This pathbreaking book describes the technical...

    Published February 5th 2015 by Psychology Press

  10. Cybercrime and Digital Forensics

    An Introduction

    By Thomas J Holt, Adam M Bossler, Kathryn C Seigfried-Spellar

    The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another...

    Published January 27th 2015 by Routledge