Skip to Content

Books by Subject

Legal, Ethical & Social Aspects of IT Books

You are currently browsing 41–50 of 301 new and published books in the subject of Legal, Ethical & Social Aspects of IT — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books – Page 5

  1. Trade Secret Theft, Industrial Espionage, and the China Threat

    By Carl Roper

    Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage...

    Published December 10th 2013 by CRC Press

  2. Managing Risk and Security in Outsourcing IT Services

    Onshore, Offshore and the Cloud

    By Frank Siepmann

    With cloud computing quickly becoming a standard in today’s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments—requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and...

    Published December 9th 2013 by Auerbach Publications

  3. Core Software Security

    Security at the Source

    By James Ransome, Anmol Misra

    "... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamitis. Carnegie Mellon...

    Published December 9th 2013 by Auerbach Publications

  4. Advances in Biometrics for Secure Human Authentication and Recognition

    Edited by Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

    Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human...

    Published December 9th 2013 by CRC Press

  5. Security Management

    A Critical Thinking Approach

    By Michael Land, Truett Ricks, Bobby Ricks

    Series: Occupational Safety & Health Guide Series

    Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals...

    Published December 4th 2013 by CRC Press

  6. Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your...

    Published November 19th 2013 by Auerbach Publications

  7. Developing and Securing the Cloud

    By Bhavani Thuraisingham

    Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.Filling this void, Developing and Securing the Cloud...

    Published October 28th 2013 by Auerbach Publications

  8. What Every Engineer Should Know About Cyber Security and Digital Forensics

    By Joanna F. DeFranco

    Series: What Every Engineer Should Know

    Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know...

    Published October 18th 2013 by CRC Press

  9. Responsive Security

    Be Ready to Be Secure

    By Meng-Chow Kang

    Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a...

    Published October 18th 2013 by CRC Press

  10. Information Security Fundamentals, Second Edition

    By Thomas R. Peltier

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second...

    Published October 16th 2013 by Auerbach Publications