Legal, Ethical & Social Aspects of IT Products

  • Why Don't We Defend Better?

    Data Breaches, Risk Management, and Public Policy, 1st Edition

    By Robert H. Sloan, Richard Warner

    The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three…

    Hardback – 2019-08-15 
    CRC Press

  • Blockchain and Web 3.0

    Social, Economic, and Technological Challenges, 1st Edition

    Edited by Massimo Ragnedda, Giuseppe Destefanis

    Blockchain and Web 3.0 fills the gap in our understanding of blockchain technologies by hosting a discussion of the new technologies in a variety of disciplinary settings.…

    Hardback – 2019-07-19 
    Routledge
    Routledge Studies in Science, Technology and Society

  • Inside the Dark Web

    1st Edition

    By Rafiqul Islam, Erdal Ozkaya

    This book provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyber-stalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. It also analyzes the online underground economy, digital currencies, and cybercrime on the Dark Web.…

    Paperback – 2019-07-10 
    CRC Press

  • Fundamentals of Internet of Things for Non-Engineers

    1st Edition

    Edited by Rebecca Lee Hammons, Ronald J. Kovac

    This book provides a comprehensive view of the current fundamentals and the anticipated future trends in the realm of Internet of Things from a practitioner’s point of view. A variety of subject matter experts in these diverse topical areas provide leaders, students, and lay persons with a fresh…

    Paperback – 2019-06-28 
    Auerbach Publications
    Technology for Non-Engineers

  • Vulnerability Management, Second Edition

    2nd Edition

    By Park Foreman

    Vulnerability Management demonstrates a proactive approach. Illustrated with examples drawn from more than three decades of multinational experience, Foreman demonstrates how much easier it is to manage potential weaknesses, than to clean up after a violation. Covering the diverse realms that chief…

    Hardback – 2019-06-28 
    Auerbach Publications

  • Gendered Power and Mobile Technology

    Intersections in the Global South, 1st Edition

    Edited by Caroline Wamala Larsson, Laura Stark

    Mobile phones are widely viewed as the information and communication technology that holds the most promise for bridging global digital divides. Gendered Power and Mobile Technology uses empirical research to focus on changing intersections between technology, gender and other categories of social…

    Hardback – 2019-06-13 
    Routledge
    Routledge Advances in Feminist Studies and Intersectionality

  • Emerging Security Algorithms and Techniques

    1st Edition

    Edited by Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh

    Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion)…

    Hardback – 2019-06-12 
    Chapman and Hall/CRC

  • Residues of Death

    Disposal Refigured, 1st Edition

    Edited by Tamara Kohn, Martin Gibbs, Bjorn Nansen, Luke van Ryn

    This book provides a critical overview of the changing ways people mourn, commemorate and interact with the remains of the dead, including bodies, materials and digital artifacts. It focuses on how residues of death persist and circulate through different spaces, materials, data and mediated…

    Hardback – 2019-06-11 
    Routledge

  • Implementing Digital Forensic Readiness

    From Reactive to Proactive Process, Second Edition, 2nd Edition

    By Jason Sachowski

    Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically…

    Hardback – 2019-06-06 
    CRC Press

  • Cybersecurity and Privacy in Cyber Physical Systems

    1st Edition

    Edited by Yassine Maleh

    This book encourages both researchers and practitioners to share and exchange their experiences and recent studies between academia and industry to highlight and discuss the recent development and emerging trends cybercrime and computer digital forensics in the Cloud of Things; to propose new…

    Hardback – 2019-05-30 
    CRC Press

  • Behavioral Cybersecurity

    Applications of Personality Psychology and Computer Science, 1st Edition

    By Wayne Patterson, Cynthia E. Winston-Proctor

    Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation. Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in…

    Hardback – 2019-05-22 
    CRC Press

  • Cybersecurity Awareness Among Students and Faculty

    1st Edition

    By Abbas Moallem

    In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the…

    Hardback – 2019-05-21 
    CRC Press

Product Search