Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 31–40 of 297 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 4

  1. Intrusion Detection in Wireless Ad-Hoc Networks

    Edited by Nabendu Chaki, Rituparna Chaki

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the...

    Published February 5th 2014 by CRC Press

  2. Networks of Power in Digital Copyright Law and Policy

    Political Salience, Expertise and the Legislative Process

    By Benjamin Farrand

    In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault’s concept of Networks of Power and Culpepper’s Quiet Politics to assess the adoption and...

    Published February 5th 2014 by Routledge

  3. The State of the Art in Intrusion Prevention and Detection

    Edited by Al-Sakib Khan Pathan

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...

    Published January 28th 2014 by Auerbach Publications

  4. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 16th 2014 by Auerbach Publications

  5. Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

    Published December 13th 2013 by Chapman and Hall/CRC

  6. Policing White-Collar Crime

    Characteristics of White-Collar Criminals

    By Petter Gottschalk

    Series: Advances in Police Theory and Practice

    Combating white-collar crime is a challenge as these criminals are found among the most powerful members of society, including politicians, business executives, and government officials. While there are many approaches to understanding this topic, Policing White-Collar Crime: Characteristics of...

    Published December 10th 2013 by CRC Press

  7. Trade Secret Theft, Industrial Espionage, and the China Threat

    By Carl Roper

    Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage...

    Published December 9th 2013 by CRC Press

  8. Managing Risk and Security in Outsourcing IT Services

    Onshore, Offshore and the Cloud

    By Frank Siepmann

    With cloud computing quickly becoming a standard in today’s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments—requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and...

    Published December 8th 2013 by Auerbach Publications

  9. Core Software Security

    Security at the Source

    By James Ransome, Anmol Misra

    "... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamitis. Carnegie Mellon...

    Published December 8th 2013 by Auerbach Publications

  10. Advances in Biometrics for Secure Human Authentication and Recognition

    Edited by Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

    Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human...

    Published December 8th 2013 by CRC Press