Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 31–40 of 267 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 4

  1. Routledge International Handbook of Participatory Design

    Edited by Jesper Simonsen, Toni Robertson

    Series: Routledge International Handbooks

    Participatory design is about the direct involvement of people in the co-design of the technologies they use. Its central concern is how collaborative design processes can be driven by the participation of the people affected by the technology designed. Embracing a diverse collection of principles...

    Published June 24th 2013 by Routledge

  2. Network Anomaly Detection

    A Machine Learning Perspective

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming...

    Published June 17th 2013 by Chapman and Hall/CRC

  3. Data Governance

    Creating Value from Information Assets

    Edited by Neera Bhansali

    As organizations deploy business intelligence and analytic systems to harness business value from their data assets, data governance programs are quickly gaining prominence. And, although data management issues have traditionally been addressed by IT departments, organizational issues critical to...

    Published June 16th 2013 by Auerbach Publications

  4. Infoglut

    How Too Much Information Is Changing the Way We Think and Know

    By Mark Andrejevic

    Today, more mediated information is available to more people than at any other time in human history. New and revitalized sense-making strategies multiply in response to the challenges of "cutting through the clutter" of competing narratives and taming the avalanche of information. Data miners, "...

    Published June 16th 2013 by Routledge

  5. Effective Surveillance for Homeland Security

    Balancing Technology and Social Issues

    Edited by Francesco Flammini, Roberto Setola, Giorgio Franceschetti

    Series: Multimedia Computing, Communication and Intelligence

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current...

    Published June 9th 2013 by Chapman and Hall/CRC

  6. The Digital Divide

    The Internet and Social Inequality in International Perspective

    Edited by Massimo Ragnedda, Glenn W. Muschert

    Series: Routledge Advances in Sociology

    This book provides an in-depth comparative analysis of inequality and the stratification of the digital sphere. Grounded in classical sociological theories of inequality, as well as empirical evidence, this book defines ‘the digital divide’ as the unequal access and utility of internet...

    Published June 4th 2013 by Routledge

  7. Privacy, Due Process and the Computational Turn

    The Philosophy of Law Meets the Philosophy of Technology

    Edited by Mireille Hildebrandt, Katja de Vries

    Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management,...

    Published May 23rd 2013 by Routledge

  8. The Complete Book of Data Anonymization

    From Planning to Implementation

    By Balaji Raghunathan

    Series: Infosys Press

    The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and...

    Published May 20th 2013 by Auerbach Publications

  9. Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

    By Mohssen Mohammed, Al-Sakib Khan Pathan

    Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods ...

    Published May 20th 2013 by Auerbach Publications

  10. Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured...

    Published May 7th 2013 by CRC Press