Skip to Content

Books by Subject

Forthcoming Legal, Ethical & Social Aspects of IT Books

You are currently browsing 1–10 of 33 forthcoming new books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from upcoming books to future books.

For books that are already published; please browse available books.

Forthcoming Books

  1. Balancing Privacy and Free Speech

    Unwanted Attention in the Age of Social Media

    By Mark Tunick

    Series: Routledge Research in Information Technology and E-Commerce Law

    In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe,...

    To Be Published August 29th 2014 by Routledge

  2. Case Studies in Intelligent Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date...

    To Be Published September 2nd 2014 by Auerbach Publications

  3. Case Studies in Secure Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the...

    To Be Published September 2nd 2014 by Auerbach Publications

  4. Official (ISC)2 Guide to the HCISPP CBK

    Edited by Steven Hernandez

    Series: (ISC)2 Press

    HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one...

    To Be Published September 18th 2014 by Auerbach Publications

  5. The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

    By Rebecca Herold, Kevin Beaver

    Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act and...

    To Be Published October 17th 2014 by Auerbach Publications

  6. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    To Be Published October 17th 2014 by Chapman and Hall/CRC

  7. Physical Security and Safety

    A Field Guide for the Practitioner

    Edited by Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

    Series: Occupational Safety & Health Guide Series

    How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the...

    To Be Published October 28th 2014 by CRC Press

  8. Android Malware and Analysis

    By Ken Dunham

    There has long been a need for a book that covers the tools and tactics for identifying and analyzing Android threats. Ken Dunham, renowned global malware expert, and leading international experts team up to document the best tools and tactics for analyzing Android malware. Many tools exist in the...

    To Be Published October 31st 2014 by Auerbach Publications

  9. The Role of Communication in Learning To Model

    Edited by Paul Brna, Michael Baker, Keith Stenning, Andree Tiberghien

    In this book, a number of experts from various disciplines take a look at three different strands in learning to model. They examine the activity of modeling from disparate theoretical standpoints, taking into account the individual situation of the individuals involved. The chapters seek to bridge...

    To Be Published November 1st 2014 by Psychology Press

  10. Web Security

    A WhiteHat Perspective

    By Hanqing Wu, Liz Zhao

    In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security:...

    To Be Published November 11th 2014 by Auerbach Publications