Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 21–30 of 301 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 3

  1. Secure Data Provenance and Inference Control with Semantic Web

    By Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar

    With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment...

    Published August 1st 2014 by Auerbach Publications

  2. Ethical Hacking and Penetration Testing Guide

    By Rafay Baloch

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking...

    Published July 28th 2014 by Auerbach Publications

  3. Official (ISC)2® Guide to the CCFP CBK

    Edited by Peter Stephenson

    Series: (ISC)2 Press

    Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has—requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis. The Certified Cyber Forensics Professional (CCFPSM) designation ensures that...

    Published July 24th 2014 by Auerbach Publications

  4. Military Ethics and Emerging Technologies

    Edited by Timothy J. Demy, George R. Lucas Jr., Bradley J. Strawser

    This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. Although the nature and politics of war never change, the weapons and technologies used in war do change and are always undergoing development. Because of that, the arsenal of weapons...

    Published June 26th 2014 by Routledge

  5. Wireless Multimedia Communication Systems

    Design, Analysis, and Implementation

    By K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

    Published June 24th 2014 by CRC Press

  6. Perspectives on Information

    Edited by Magnus Ramage, David Chapman

    Series: Routledge Studies in Library and Information Science

    Information is everywhere, and defines everything in today's society. Moreover, information is a key concept in a wide range of academic disciplines, from quantum physics to public policy. However, these disciplines all interpret the concept in quite different ways. This book looks at information...

    Published June 15th 2014 by Routledge

  7. The Frugal CISO

    Using Innovation and Smart Approaches to Maximize Your Security Posture

    By Kerry Ann Anderson

    If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security...

    Published May 19th 2014 by Auerbach Publications

  8. PCI Compliance

    The Definitive Guide

    By Abhay Bhargav

    Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide...

    Published May 5th 2014 by Auerbach Publications

  9. Security without Obscurity

    A Guide to Confidentiality, Authentication, and Integrity

    By J.J. Stapleton

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

    Published May 2nd 2014 by Auerbach Publications

  10. Social Networking as a Criminal Enterprise

    Edited by Catherine D. Marcum, George E. Higgins

    As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts,...

    Published April 28th 2014 by CRC Press