Legal, Ethical & Social Aspects of IT Products

  • Securing the Cloud

    Security Strategies for the Ubiquitous Data Center, 1st Edition

    By Curtis Franklin Jr., Brian Chee

    This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, it's a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional computing assets. The book integrates…

    Hardback – 2019-06-01 
    Auerbach Publications

  • Fraud Auditing Using CAATT

    A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud, 1st Edition

    By Shaun Aghili

    This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also…

    Hardback – 2019-06-01 
    Auerbach Publications
    Internal Audit and IT Audit

  • HIPAA and PCI Audits

    Secrets to Getting GREAT Results, 1st Edition

    By Raj Goel

    This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling…

    Hardback – 2019-05-31 
    Auerbach Publications

  • Protecting Information Assets and IT Infrastructure in the Cloud

    1st Edition

    By Ravi Das

    Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP…

    Hardback – 2019-05-15 
    Auerbach Publications

  • Cybersecurity and Privacy in Cyber Physical Systems

    1st Edition

    Edited by Yassine Maleh

    This book encourages both researchers and practitioners to share and exchange their experiences and recent studies between academia and industry to highlight and discuss the recent development and emerging trends cybercrime and computer digital forensics in the Cloud of Things; to propose new…

    Hardback – 2019-05-01 
    CRC Press

  • Gendered Power and Mobile Technology

    Intersections in the Global South, 1st Edition

    Edited by Caroline Wamala Larsson, Laura Stark

    Mobile phones are widely viewed as the information and communication technology that holds the most promise for bridging global digital divides. Gendered Power and Mobile Technology uses empirical research to focus on changing intersections between technology, gender and other categories of social…

    Hardback – 2019-04-30 
    Routledge
    Routledge Advances in Feminist Studies and Intersectionality

  • Building and Managing an Effective Security Operations Center

    1st Edition

    By James L. Rainey, III

    An information security operations involves monitoring, assessing, and defending enterprise information systems. For organizations without a formalized incident-handling capability, the creation from scratch of a security operations center that enables centralized visibility, alerting and…

    Paperback – 2019-04-15 
    Auerbach Publications
    Internal Audit and IT Audit

  • Introduction to Public Key Cryptography

    1st Edition

    By Hu Xiong

    In addition to laying the foundation for today’s online security industry, PKC made encryption technologies accessible to individuals and companies. In view of the many achievements of PKC, it should be accessible to most people. Yet, it is difficult to get a unified account of the evolution of PKC…

    Hardback – 2019-04-15 
    Auerbach Publications

  • Machine Learning for Computer and Cyber Security

    Principle, Algorithms, and Practices, 1st Edition

    Edited by Brij Bhooshian Gupta, Quan Z. Sheng

    While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer…

    Hardback – 2019-03-31 
    CRC Press

  • Biometrics, Surveillance and the Law

    Societies of Restricted Access, Discipline and Control, 1st Edition

    By Sara M. Smyth

    The use of biometric identification systems is rapidly increasing across the world due to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information…

    Hardback – 2019-03-28 
    Routledge
    Routledge Research in the Law of Emerging Technologies

  • Psychology and Social Media

    Becoming Digital, 1st Edition

    By Ciarán Mc Mahon

    This book explores and critiques the psychology of social media over the past decade, and analyses treatment of social media within a scientific framework and historical context. In examining the subjective experience of being on social media services by interpreting research from various areas of…

    Paperback – 2019-03-15 
    Routledge

  • The Patentability of Software

    Software as Mathematics, 1st Edition

    By Anton Hughes

    This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU and Australia have attempted to deal with the problems surrounding the patentability of software, and describes why it is that the software patent issue should be dealt…

    Hardback – 2019-03-07 
    Routledge
    Routledge Research in Intellectual Property

Product Search