Legal, Ethical & Social Aspects of IT Products

  • Network and Data Security for Non-Engineers

    By Frank M. Groom, Kevin Groom, Stephan S. Jones

    Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful…

    Paperback – 2016-08-04 
    Auerbach Publications

  • Fundamentals of Medical Practice Investigation

    By Jeffrey D. Lane

    This area of criminal investigation has very few published resourses available. it provide the novice medical investigator a resource to guide them through the investigative process. Seasoned medical investigators may find the work useful as a tool to refresh their skills. It is developed to bring…

    Hardback – 2016-07-29 
    CRC Press

  • Software, Infrastructure, Labor

    A Media Theory of Logistical Nightmares

    By Ned Rossiter

    Infrastructure makes worlds. Software coordinates labor. Logistics governs movement. These pillars of contemporary capitalism correspond with the materiality of digital communication systems on a planetary scale. Ned Rossiter theorizes the force of logistical media to discern how subjectivity and…

    Paperback – 2016-07-26 
    Routledge

  • Practical Cloud Security

    A Cross-Industry View

    By Melvin B. Greer, Jr., Kevin L. Jackson

    Cloud computing is a technical evolution and the blend of highly automated IT with various industry business models. It has created an explosion of cloud-driven business service solutions, creating industry-specific cloud security challenges. The authors use executive level survey data,…

    Hardback – 2016-07-20 
    CRC Press

  • Information, Freedom and Property

    The Philosophy of Law Meets the Philosophy of Technology

    Edited by Mireille Hildebrandt, Bibi van den Berg

    This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy. It inquires into the physics, the technologies, the business models, the governmental strategies and last but not least the legal…

    Hardback – 2016-07-11 
    Routledge

  • Electronically Stored Information

    The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

    By David R. Matthews

    Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or…

    Hardback – 2016-06-06 
    Auerbach Publications

  • Protocols for Secure Electronic Commerce, Third Edition

    By Mostafa Hashem Sherif

    Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:…

    Hardback – 2016-06-03 
    CRC Press

  • Circuits and Systems for Security and Privacy

    Edited by Farhana Sheikh, Leonel Sousa

    Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of…

    Hardback – 2016-06-02 
    CRC Press
    Devices, Circuits, and Systems

  • Information Security Policies, Procedures, and Standards

    A Practitioner's Reference

    By Douglas J. Landoll

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the…

    Hardback – 2016-05-25 
    Auerbach Publications

  • Mastering the Five Tiers of Audit Competency

    The Essence of Effective Auditing

    By Ann Butera

    Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing…

    Paperback – 2016-05-16 
    Auerbach Publications
    Internal Audit and IT Audit

  • Pervasive Information Systems

    By Panos E Kourouthanassis, George M Giaglis, George M Giaglis

    Today's ubiquitous computing technology is imbedded in everyday objects from cars to clothes to shipping containers, whose location, context, and state can be monitored, instantly processed, and acted upon. This new volume in the "Advances in Management Information Systems" series provides an…

    Paperback – 2016-05-16 
    Routledge

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with…

    Hardback – 2016-05-04 
    Chapman and Hall/CRC

Product Search