Skip to Content

Books by Subject

Forthcoming Legal, Ethical & Social Aspects of IT Books

You are currently browsing 1–10 of 61 forthcoming new books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from upcoming books to future books.

For books that are already published; please browse available books.

Forthcoming Books

  1. PCI Compliance

    The Definitive Guide

    By Abhay Bhargav

    Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide...

    To Be Published April 29th 2014 by Auerbach Publications

  2. Security for Service Oriented Architectures

    By Walter Williams

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both...

    To Be Published April 30th 2014 by Auerbach Publications

  3. Conducting Network Penetration and Espionage in a Global Environment

    By Bruce Middleton

    When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

    To Be Published April 30th 2014 by Auerbach Publications

  4. Security without Obscurity

    A Guide to Confidentiality, Authentication, and Integrity

    By J.J. Stapleton

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

    To Be Published May 14th 2014 by Auerbach Publications

  5. The Frugal CISO

    Using Innovation and Smart Approaches to Maximize Your Security Posture

    By Kerry Ann Anderson

    If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security...

    To Be Published May 26th 2014 by Auerbach Publications

  6. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    To Be Published June 2nd 2014 by Chapman and Hall/CRC

  7. Military Ethics and Emerging Technologies

    Edited by Timothy J. Demy, George R. Lucas Jr., Bradley J. Strawser

    This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. Although the nature and politics of war never change, the weapons and technologies used in war do change and are always undergoing development. Because of that, the arsenal of weapons...

    To Be Published June 11th 2014 by Routledge

  8. Perspectives on Information

    Edited by Magnus Ramage, David Chapman

    Series: Routledge Studies in Library and Information Science

    Information is everywhere, and defines everything in today's society. Moreover, information is a key concept in a wide range of academic disciplines, from quantum physics to public policy. However, these disciplines all interpret the concept in quite different ways. This book looks at information...

    To Be Published June 14th 2014 by Routledge

  9. Wireless Multimedia Communication Systems

    Design, Analysis, and Implementation

    By K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

    Rapid development in software, hardware, mobile networks, and the potential of interactive media poses many questions for operators, manufacturers, and researchers of wireless multimedia communication systems (WMCSs). This book strives to answer those ...

    To Be Published June 19th 2014 by CRC Press

  10. Ethical Hacking and Penetration Testing Guide

    By Rafay Baloch

    This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack...

    To Be Published July 28th 2014 by Auerbach Publications