Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 21–30 of 297 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 3

  1. Wireless Multimedia Communication Systems

    Design, Analysis, and Implementation

    By K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

    Published June 23rd 2014 by CRC Press

  2. Perspectives on Information

    Edited by Magnus Ramage, David Chapman

    Series: Routledge Studies in Library and Information Science

    Information is everywhere, and defines everything in today's society. Moreover, information is a key concept in a wide range of academic disciplines, from quantum physics to public policy. However, these disciplines all interpret the concept in quite different ways. This book looks at information...

    Published June 14th 2014 by Routledge

  3. The Frugal CISO

    Using Innovation and Smart Approaches to Maximize Your Security Posture

    By Kerry Ann Anderson

    If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security...

    Published May 18th 2014 by Auerbach Publications

  4. PCI Compliance

    The Definitive Guide

    By Abhay Bhargav

    Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide...

    Published May 4th 2014 by Auerbach Publications

  5. Security without Obscurity

    A Guide to Confidentiality, Authentication, and Integrity

    By J.J. Stapleton

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

    Published May 1st 2014 by Auerbach Publications

  6. Social Networking as a Criminal Enterprise

    Edited by Catherine D. Marcum, George E. Higgins

    As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts,...

    Published April 27th 2014 by CRC Press

  7. Conducting Network Penetration and Espionage in a Global Environment

    By Bruce Middleton

    When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

    Published April 27th 2014 by Auerbach Publications

  8. Security for Service Oriented Architectures

    By Walter Williams

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both...

    Published April 23rd 2014 by Auerbach Publications

  9. Critique, Social Media and the Information Society

    Edited by Christian Fuchs, Marisol Sandoval

    Series: Routledge Studies in Science, Technology and Society

    In times of global capitalist crisis we are witnessing a return of critique in the form of a surging interest in critical theories (such as the critical political economy of Karl Marx) and social rebellions as a reaction to the commodification and instrumentalization of everything. On one hand,...

    Published April 16th 2014 by Routledge

  10. Anonymous Communication Networks

    Protecting Privacy on the Web

    By Kun Peng

    In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for...

    Published April 9th 2014 by Auerbach Publications