Skip to Content

Books by Subject

Forthcoming Legal, Ethical & Social Aspects of IT Books

You are currently browsing 1–10 of 60 forthcoming new books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from upcoming books to future books.

For books that are already published; please browse available books.

Forthcoming Books

  1. Secure Data Provenance and Inference Control with Semantic Web

    By Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar

    With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment...

    To Be Published August 4th 2014 by Auerbach Publications

  2. Ethical Hacking and Penetration Testing Guide

    By Rafay Baloch

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking...

    To Be Published August 5th 2014 by Auerbach Publications

  3. Cognitive Systems

    Human Cognitive Models in Systems Design

    Edited by Chris Forsythe, Michael L. Bernard, Timothy E. Goldsmith

    The leading thinkers from the cognitive science tradition participated in a workshop sponsored by Sandia National Laboratories in July of 2003 to discuss progress in building their models. The goal was to summarize the theoretical and empirical bases for cognitive systems and to present exemplary...

    To Be Published August 15th 2014 by Psychology Press

  4. Electronic Collaboration in Science

    Edited by Stephen H. Koslow, Michael F. Huerta

    Series: Progress in Neuroinformatics Research Series

    The increasingly sophisticated and powerful information technology we are creating plays an ever more prominent role in facilitating interaction and cooperation in everyday life. The time has come to harness it in the service of scientific research. This pathbreaking book describes the technical...

    To Be Published August 15th 2014 by Psychology Press

  5. Representation and Processing of Spatial Expressions

    Edited by Patrick Olivier, Klaus-Peter Gapp

    Coping with spatial expressions in a plausible manner is a crucial problem in a number of research fields, specifically cognitive science, artificial intelligence, psychology, and linguistics. This volume contains a set of theoretical analyses as well as accounts of applications which deal with the...

    To Be Published August 15th 2014 by Psychology Press

  6. Case Studies in Intelligent Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date...

    To Be Published September 3rd 2014 by Auerbach Publications

  7. Case Studies in Secure Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the...

    To Be Published September 3rd 2014 by Auerbach Publications

  8. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    To Be Published September 4th 2014 by Chapman and Hall/CRC

  9. Balancing Privacy and Free Speech

    Unwanted Attention in the Age of Social Media

    By Mark Tunick

    Series: Routledge Research in Information Technology and E-Commerce Law

    In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe,...

    To Be Published September 9th 2014 by Routledge

  10. Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

    Edited by Adam Gordon

    Series: (ISC)2 Press

    This book presents material that has been prepared by CISSP credential holders and reviewed by (ISC)² authorized instructors who are highly knowledgeable about the latest information security-related developments and are proven experts in the CISSP common body of knowledge (CBK). Endorsed by the (...

    To Be Published September 16th 2014 by Auerbach Publications