Legal, Ethical & Social Aspects of IT Products

  • Hacking Binary Programs and Exploit Analysis

    By Adam Aviv

    This book provides the reader a dynamic educational experience focused on stack based binary exploits. It provides a guide for educators in developing course syllabi and coursework for students. The goal of this book can further the education of important security topics of binary exploits focused…

    Paperback – 2018-12-15 
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Human and Social Behavior in Cybersecurity

    By Terry Bossomaier, Steven D'Alessandro, Roger Bradbury

    The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these…

    Hardback – 2018-12-15 
    Auerbach Publications

  • Cryptographic and Information Security Approaches for Images and Videos

    By S. Ramakrishnan

    This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application…

    Hardback – 2018-12-03 
    CRC Press

  • CIO's Guide to Security Incident Management

    By Matthew William Arthur Pemble, Wendy Fiona Goucher

    This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan…

    Hardback – 2018-11-15 
    Auerbach Publications

  • The Insider Threat

    Assessment and Mitigation of Risks

    By Eleanor E. Thompson

    This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This…

    Hardback – 2018-11-15 
    Auerbach Publications

  • Personal Mobile Devices in the Enterprise

    Security and Privacy Concerns

    By Lawrence Gerard Dobranski

    Leaders of many public and private organizations face increased pressure to allow the use of personal mobile devices in their enterprises. This book provides an understanding of the increased risks that accompany the introduction of BYOD (Bring Your Own Device) into the enterprise.…

    Hardback – 2018-10-31 
    Auerbach Publications

  • iOS App Penetration Testing and Security

    By Swaroop Yermalkar

    SVideo cassette – 2018-10-31 
    CRC Press

  • Law, Technology and Dispute Resolution

    The Privatisation of Coercion

    By Riikka Koulu

    The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely…

    Hardback – 2018-10-25 
    Law, Science and Society

  • Regulating Blockchain

    Law, Technology and the Ethics of Political Economy

    By Robert Herian

    As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, "blockchain" entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of…

    Hardback – 2018-10-18 

  • Integrating a Usable Security Protocol into User Authentication Services Design Process

    By Christina Braz, Ahmed Seffah, Bilal Naqvi

    There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is…

    Hardback – 2018-10-11 
    Auerbach Publications

  • Introduction to Public Key Cryptography

    By Hu Xiong

    In addition to laying the foundation for today’s online security industry, PKC made encryption technologies accessible to individuals and companies. In view of the many achievements of PKC, it should be accessible to most people. Yet, it is difficult to get a unified account of the evolution of PKC…

    Hardback – 2018-10-01 
    Auerbach Publications

  • Information Security Management Handbook, Fifth Edition

    Volume 2

    By Tipton Harold Tipton

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP)…

    Hardback – 2018-09-30 
    Auerbach Publications

Product Search