Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 41–50 of 297 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 5

  1. Responsive Security

    Be Ready to Be Secure

    By Meng-Chow Kang

    Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a...

    Published October 18th 2013 by CRC Press

  2. Information Security Fundamentals, Second Edition

    By Thomas R. Peltier

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second...

    Published October 16th 2013 by Auerbach Publications

  3. Information Security Management Handbook, 2013 CD-ROM Edition

    Edited by James S. Tiller, Rich O'Hanley

    Containing the complete contents of Volumes 1-7, the Information Security Management Handbook, 2013 CD-ROM Edition is an authoritative resource that is linked and searchable by keyword. It updates the benchmark Volume 1 with information on the latest developments in information security and recent...

    Published October 15th 2013 by Auerbach Publications

  4. Cyber-Physical Systems

    Integrated Computing and Engineering Design

    By Fei Hu

    Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physical objects, it is believed CPSs will transform how we interact with the physical world, just like the Internet transformed how we interact with one...

    Published September 26th 2013 by CRC Press

  5. Software Test Attacks to Break Mobile and Embedded Devices

    By Jon Duncan Hagar

    Series: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series

    Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book...

    Published September 25th 2013 by Chapman and Hall/CRC

  6. Information Security Management Handbook, Sixth Edition, Volume 7

    Edited by Richard O'Hanley, James S. Tiller

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it...

    Published August 29th 2013 by Auerbach Publications

  7. Official (ISC)2® Guide to the ISSAP® CBK, Second Edition

    Edited by (ISC)² Corporate

    Series: (ISC)2 Press

    Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplying an authoritative review of...

    Published August 29th 2013 by Auerbach Publications

  8. Rhetoric and Ethics in the Cybernetic Age

    The Transhuman Condition

    By Jeff Pruchnic

    Series: Routledge Studies in Rhetoric and Communication

    It has become increasingly difficult to ignore the ways that the centrality of new media and technologies — from the global networking of information systems and social media to new possibilities for altering human genetics — seem to make obsolete our traditional ways of thinking about ethics and...

    Published August 27th 2013 by Routledge

  9. Official (ISC)2 Guide to the CSSLP CBK, Second Edition

    By Mano Paul

    Series: (ISC)2 Press

    The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable...

    Published August 20th 2013 by Auerbach Publications

  10. Introduction to Computer and Network Security

    Navigating Shades of Gray

    By Richard R. Brooks

    Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical...

    Published August 19th 2013 by Chapman and Hall/CRC