Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 31–40 of 283 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 4

  1. Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your...

    Published November 19th 2013 by Auerbach Publications

  2. Developing and Securing the Cloud

    By Bhavani Thuraisingham

    Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.Filling this void, Developing and Securing the Cloud...

    Published October 28th 2013 by Auerbach Publications

  3. What Every Engineer Should Know About Cyber Security and Digital Forensics

    By Joanna F. DeFranco

    Series: What Every Engineer Should Know

    Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know...

    Published October 18th 2013 by CRC Press

  4. Responsive Security

    Be Ready to Be Secure

    By Meng-Chow Kang

    Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a...

    Published October 18th 2013 by CRC Press

  5. Information Security Fundamentals, Second Edition

    By Thomas R. Peltier

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second...

    Published October 16th 2013 by Auerbach Publications

  6. Information Security Management Handbook, 2013 CD-ROM Edition

    Edited by James S. Tiller, Rich O'Hanley

    Containing the complete contents of Volumes 1-7, the Information Security Management Handbook, 2013 CD-ROM Edition is an authoritative resource that is linked and searchable by keyword. It updates the benchmark Volume 1 with information on the latest developments in information security and recent...

    Published October 15th 2013 by Auerbach Publications

  7. Cyber-Physical Systems

    Integrated Computing and Engineering Design

    By Fei Hu

    Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physical objects, it is believed CPSs will transform how we interact with the physical world, just like the Internet transformed how we interact with one...

    Published September 26th 2013 by CRC Press

  8. Software Test Attacks to Break Mobile and Embedded Devices

    By Jon Duncan Hagar

    Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

    Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book...

    Published September 25th 2013 by Chapman and Hall/CRC

  9. Information Security Management Handbook, Sixth Edition, Volume 7

    Edited by Richard O'Hanley, James S. Tiller

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it...

    Published August 29th 2013 by Auerbach Publications

  10. Official (ISC)2® Guide to the ISSAP® CBK, Second Edition

    Edited by (ISC)² Corporate

    Series: (ISC)2 Press

    Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplying an authoritative review of...

    Published August 29th 2013 by Auerbach Publications