Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 41–50 of 281 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 5

  1. Introduction to Computer and Network Security

    Navigating Shades of Gray

    By Richard R. Brooks

    Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical...

    Published August 18th 2013 by Chapman and Hall/CRC

  2. Enterprise Architecture and Information Assurance

    Developing a Secure Foundation

    By James A. Scholz

    Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how...

    Published July 28th 2013 by Auerbach Publications

  3. Security and Privacy in Smart Grids

    Edited by Yang Xiao

    Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and...

    Published July 21st 2013 by CRC Press

  4. Conflict and Cooperation in Cyberspace

    The Challenge to National Security

    Edited by Panayotis A Yannakogeorgos, Adam B Lowther

    Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world’s most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world....

    Published July 21st 2013 by CRC Press

  5. Unauthorized Access

    The Crisis in Online Privacy and Security

    By Robert H. Sloan, Richard Warner

    Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in...

    Published July 14th 2013 by CRC Press

  6. The Data Bank Society (Routledge Revivals)

    Organizations, Computers and Social Freedom

    By Malcolm Warner, Mike Stone

    Series: Routledge Revivals

    This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy...

    Published July 9th 2013 by Routledge

  7. Routledge International Handbook of Participatory Design

    Edited by Jesper Simonsen, Toni Robertson

    Series: Routledge International Handbooks

    Participatory design is about the direct involvement of people in the co-design of the technologies they use. Its central concern is how collaborative design processes can be driven by the participation of the people affected by the technology designed. Embracing a diverse collection of principles...

    Published June 24th 2013 by Routledge

  8. Network Anomaly Detection

    A Machine Learning Perspective

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming...

    Published June 17th 2013 by Chapman and Hall/CRC

  9. Data Governance

    Creating Value from Information Assets

    Edited by Neera Bhansali

    As organizations deploy business intelligence and analytic systems to harness business value from their data assets, data governance programs are quickly gaining prominence. And, although data management issues have traditionally been addressed by IT departments, organizational issues critical to...

    Published June 16th 2013 by Auerbach Publications

  10. Infoglut

    How Too Much Information Is Changing the Way We Think and Know

    By Mark Andrejevic

    Today, more mediated information is available to more people than at any other time in human history. New and revitalized sense-making strategies multiply in response to the challenges of "cutting through the clutter" of competing narratives and taming the avalanche of information. Data miners, "...

    Published June 16th 2013 by Routledge