Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 31–40 of 301 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 4

  1. Conducting Network Penetration and Espionage in a Global Environment

    By Bruce Middleton

    When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

    Published April 28th 2014 by Auerbach Publications

  2. Security for Service Oriented Architectures

    By Walter Williams

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both...

    Published April 24th 2014 by Auerbach Publications

  3. Critique, Social Media and the Information Society

    Edited by Christian Fuchs, Marisol Sandoval

    Series: Routledge Studies in Science, Technology and Society

    In times of global capitalist crisis we are witnessing a return of critique in the form of a surging interest in critical theories (such as the critical political economy of Karl Marx) and social rebellions as a reaction to the commodification and instrumentalization of everything. On one hand,...

    Published April 17th 2014 by Routledge

  4. Anonymous Communication Networks

    Protecting Privacy on the Web

    By Kun Peng

    In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for...

    Published April 10th 2014 by Auerbach Publications

  5. Intrusion Detection in Wireless Ad-Hoc Networks

    Edited by Nabendu Chaki, Rituparna Chaki

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the...

    Published February 6th 2014 by CRC Press

  6. Networks of Power in Digital Copyright Law and Policy

    Political Salience, Expertise and the Legislative Process

    By Benjamin Farrand

    In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault’s concept of Networks of Power and Culpepper’s Quiet Politics to assess the adoption and...

    Published February 6th 2014 by Routledge

  7. The State of the Art in Intrusion Prevention and Detection

    Edited by Al-Sakib Khan Pathan

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...

    Published January 29th 2014 by Auerbach Publications

  8. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 17th 2014 by Auerbach Publications

  9. Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

    Published December 14th 2013 by Chapman and Hall/CRC

  10. Policing White-Collar Crime

    Characteristics of White-Collar Criminals

    By Petter Gottschalk

    Series: Advances in Police Theory and Practice

    Combating white-collar crime is a challenge as these criminals are found among the most powerful members of society, including politicians, business executives, and government officials. While there are many approaches to understanding this topic, Policing White-Collar Crime: Characteristics of...

    Published December 11th 2013 by CRC Press