Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 11–20 of 300 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 2

  1. Physical Security and Safety

    A Field Guide for the Practitioner

    Edited by Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

    Series: Occupational Safety & Health Guide Series

    How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the...

    Published October 28th 2014 by CRC Press

  2. Android Malware and Analysis

    By Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere

    The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware...

    Published October 23rd 2014 by Auerbach Publications

  3. The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

    By Rebecca Herold, Kevin Beaver

    Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the...

    Published October 19th 2014 by Auerbach Publications

  4. The Role of Communication in Learning To Model

    Edited by Paul Brna, Michael Baker, Keith Stenning, Andree Tiberghien

    In this book, a number of experts from various disciplines take a look at three different strands in learning to model. They examine the activity of modeling from disparate theoretical standpoints, taking into account the individual situation of the individuals involved. The chapters seek to bridge...

    Published September 10th 2014 by Psychology Press

  5. Official (ISC)2 Guide to the HCISPP CBK

    Edited by Steven Hernandez

    Series: (ISC)2 Press

    HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one...

    Published September 9th 2014 by Auerbach Publications

  6. Balancing Privacy and Free Speech

    Unwanted Attention in the Age of Social Media

    By Mark Tunick

    Series: Routledge Research in Information Technology and E-Commerce Law

    In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe,...

    Published September 3rd 2014 by Routledge

  7. Case Studies in Intelligent Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date...

    Published August 28th 2014 by Auerbach Publications

  8. Case Studies in Secure Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the...

    Published August 28th 2014 by Auerbach Publications

  9. Secure Data Provenance and Inference Control with Semantic Web

    By Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar

    With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment...

    Published July 31st 2014 by Auerbach Publications

  10. Ethical Hacking and Penetration Testing Guide

    By Rafay Baloch

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking...

    Published July 27th 2014 by Auerbach Publications