Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 21–30 of 279 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 3

  1. The State of the Art in Intrusion Prevention and Detection

    Edited by Al-Sakib Khan Pathan

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...

    Published January 28th 2014 by Auerbach Publications

  2. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 16th 2014 by Auerbach Publications

  3. Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

    Published December 13th 2013 by Chapman and Hall/CRC

  4. Trade Secret Theft, Industrial Espionage, and the China Threat

    By Carl Roper

    Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage...

    Published December 9th 2013 by CRC Press

  5. Managing Risk and Security in Outsourcing IT Services

    Onshore, Offshore and the Cloud

    By Frank Siepmann

    With cloud computing quickly becoming a standard in today’s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments—requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and...

    Published December 8th 2013 by Auerbach Publications

  6. Core Software Security

    Security at the Source

    By James Ransome, Anmol Misra

    "... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamitis. Carnegie Mellon...

    Published December 8th 2013 by Auerbach Publications

  7. Advances in Biometrics for Secure Human Authentication and Recognition

    Edited by Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

    Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human...

    Published December 8th 2013 by CRC Press

  8. Security Management

    A Critical Thinking Approach

    By Michael Land, Truett Ricks, Bobby Ricks

    Series: Occupational Safety & Health Guide Series

    Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals...

    Published December 3rd 2013 by CRC Press

  9. Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your...

    Published November 18th 2013 by Auerbach Publications

  10. Developing and Securing the Cloud

    By Bhavani Thuraisingham

    Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.Filling this void, Developing and Securing the Cloud...

    Published October 27th 2013 by Auerbach Publications