Legal, Ethical & Social Aspects of IT Products

  • Social Media Warfare

    Equal Weapons for All

    By Michael Erbschloe

    Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and…

    Hardback – 2017-05-26 
    Auerbach Publications

  • Practitioner’s Guide to Business Impact Analysis

    By Priti Sikdar

    This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists…

    Hardback – 2017-05-17 
    Auerbach Publications
    Internal Audit and IT Audit

  • Cybercrime in Progress

    Theory and prevention of technology-enabled offenses

    By Thomas J Holt, Adam M Bossler

    The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these issues has increased dramatically over the last decade, as have studies on ways to prevent and police…

    Paperback – 2017-04-27 
    Routledge
    Crime Science Series

  • Imagined Futures in Science, Technology and Society

    Edited by Gert Verschraegen, Frederic Vandermoere, Luc Braeckmans, Barbara Segaert

    Imagining, forecasting and predicting the future is an inextricable and increasingly important part of the present. States, organizations and individuals almost continuously have to make decisions about future actions, financial investments or technological innovation, without much knowledge of…

    Hardback – 2017-04-07 
    Routledge
    Routledge Studies in Science, Technology and Society

  • Data Analytics for Internal Auditors

    By Richard E. Cascarino

    There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that…

    Hardback – 2017-03-27 
    Auerbach Publications
    Internal Audit and IT Audit

  • Implementing Cybersecurity

    A Guide to the National Institute of Standards and Technology Risk Management Framework

    By Anne Kohnke, Ken Sigler, Dan Shoemaker

    The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain…

    Hardback – 2017-03-20 
    Auerbach Publications
    Internal Audit and IT Audit

  • HIPAA and PCI Audits

    Secrets to Getting GREAT Results

    By Raj Goel

    This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling…

    Hardback – 2017-03-15 
    Auerbach Publications

  • The CISO Journey

    Life Lessons and Concepts to Accelerate Your Professional Development

    By Eugene M Fredriksen

    The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each…

    Hardback – 2017-03-14 
    Auerbach Publications
    Internal Audit and IT Audit

  • Cybersecurity

    Geopolitics, Law, and Policy

    By Amos N. Guiora

    This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement…

    Paperback – 2017-03-10 
    CRC Press

  • Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured…

    Paperback – 2017-02-28 
    CRC Press

  • Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your…

    Paperback – 2017-02-28 
    Auerbach Publications

  • Walling Out the Insiders

    Controlling Access to Improve Organizational Security

    By Michael Erbschloe

    First Published in 2017. Routledge is an imprint of Taylor & Francis, an Informa company.…

    Paperback – 2017-02-23
    Auerbach Publications

Product Search