Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 221–230 of 277 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 23

  1. Network Security Technologies

    By Kwok T. Fung

    Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy,...

    Published October 28th 2004 by Auerbach Publications

  2. A Practical Guide to Security Assessments

    By Sudhanshu Kairab

    The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this with a slowdown in IT spending...

    Published September 29th 2004 by Auerbach Publications

  3. The Ethical Hack

    A Framework for Business Value Penetration Testing

    By James S. Tiller

    There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical...

    Published September 29th 2004 by Auerbach Publications

  4. Assessing and Managing Security Risk in IT Systems

    A Structured Methodology

    By John McCumber

    Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly...

    Published August 12th 2004 by Auerbach Publications

  5. Information Security Policies and Procedures

    A Practitioner's Reference, Second Edition

    By Thomas R. Peltier

    Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security...

    Published June 11th 2004 by Auerbach Publications

  6. Public Key Infrastructure

    Building Trusted Applications and Web Services

    By John R. Vacca

    With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years,...

    Published May 11th 2004 by Auerbach Publications

  7. Watermarking Systems Engineering

    Enabling Digital Assets Security and Other Applications

    Edited by Mauro Barni, Franco Bartolini

    Series: Signal Processing and Communications

    The rapid growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the fundamental principles of watermarking system design and discusses...

    Published February 3rd 2004 by CRC Press

  8. Surviving Security

    How to Integrate People, Process, and Technology

    By Amanda Andress

    Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by...

    Published December 18th 2003 by Auerbach Publications

  9. Protocols for Secure Electronic Commerce, Second Edition

    By Mostafa Hashem Sherif

    Series: Advanced & Emerging Communications Technologies

    The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this...

    Published November 24th 2003 by CRC Press

  10. The Hacker's Handbook

    The Strategy Behind Breaking into and Defending Networks

    By Susan Young, Dave Aitel

    The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/...

    Published November 24th 2003 by Auerbach Publications