Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 21–30 of 297 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 3

  1. Security without Obscurity

    A Guide to Confidentiality, Authentication, and Integrity

    By J.J. Stapleton

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

    Published May 1st 2014 by Auerbach Publications

  2. Social Networking as a Criminal Enterprise

    Edited by Catherine D. Marcum, George E. Higgins

    As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts,...

    Published April 27th 2014 by CRC Press

  3. Conducting Network Penetration and Espionage in a Global Environment

    By Bruce Middleton

    When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

    Published April 27th 2014 by Auerbach Publications

  4. Security for Service Oriented Architectures

    By Walter Williams

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both...

    Published April 23rd 2014 by Auerbach Publications

  5. Critique, Social Media and the Information Society

    Edited by Christian Fuchs, Marisol Sandoval

    Series: Routledge Studies in Science, Technology and Society

    In times of global capitalist crisis we are witnessing a return of critique in the form of a surging interest in critical theories (such as the critical political economy of Karl Marx) and social rebellions as a reaction to the commodification and instrumentalization of everything. On one hand,...

    Published April 16th 2014 by Routledge

  6. Anonymous Communication Networks

    Protecting Privacy on the Web

    By Kun Peng

    In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for...

    Published April 9th 2014 by Auerbach Publications

  7. Intrusion Detection in Wireless Ad-Hoc Networks

    Edited by Nabendu Chaki, Rituparna Chaki

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the...

    Published February 5th 2014 by CRC Press

  8. Networks of Power in Digital Copyright Law and Policy

    Political Salience, Expertise and the Legislative Process

    By Benjamin Farrand

    In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault’s concept of Networks of Power and Culpepper’s Quiet Politics to assess the adoption and...

    Published February 5th 2014 by Routledge

  9. The State of the Art in Intrusion Prevention and Detection

    Edited by Al-Sakib Khan Pathan

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...

    Published January 28th 2014 by Auerbach Publications

  10. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 16th 2014 by Auerbach Publications