Legal, Ethical & Social Aspects of IT Products

  • The Future of Internet Policy

    Edited by Peter Decherney, Victor Pickard

    All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across…

    Paperback – 2017-11-05 
    Routledge

  • Anti-Spam Techniques Based on Artificial Immune System

    By Ying Tan

    Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial…

    Paperback – 2017-11-01 
    CRC Press

  • Collaborative Cyber Threat Intelligence

    Detecting and Responding to Advanced Cyber Attacks on National Level

    Edited by Florian Skopik

    Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to…

    Hardback – 2017-10-31 
    Auerbach Publications

  • Study Guide for TOGAF 9.1 Certifications

    By B. V. Kumar

    This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ‘The TOGAF Foundation Certification’ and ‘The TOGAF Certified Certification’ will find this book useful. The contents of the book…

    Hardback – 2017-10-31 
    Chapman and Hall/CRC

  • Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured…

    Paperback – 2017-10-31 
    CRC Press

  • Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your…

    Paperback – 2017-10-31 
    Auerbach Publications

  • Ethics and Security Automata

    Policy and Technical Challenges of the Robotic Use of Force

    By Sean Welsh

    Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this…

    Hardback – 2017-10-31 
    Routledge
    Emerging Technologies, Ethics and International Affairs

  • Cybercrime and Digital Forensics

    An Introduction, 2nd Edition

    By Thomas J. Holt, Adam M. Bossler, Kathryn Seigfried-Spellar

    This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of…

    Paperback – 2017-10-30 
    Routledge

  • Cyberspace and Cybersecurity, Second Edition

    By George Kostopoulos

    Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include…

    Hardback – 2017-10-18 
    Auerbach Publications

  • Technocrime and Criminological Theory

    Edited by Kevin F. Steinmetz, Matt R. Nobles

    Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist…

    Paperback – 2017-10-13 
    CRC Press

  • Big Data Data Analytics in Cybersecurity

    Edited by Onur Savas, Julia Deng

    Big data analytics provide more accurate, timely, and actionable decisions for both cybersecurity and IT management. This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification,…

    Hardback – 2017-10-02 
    Auerbach Publications
    Data Analytics Applications

  • Fraud Hotlines

    Design, Performance, and Assessment

    By Chelsea A. Binns

    This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines.…

    Hardback – 2017-09-27 
    Auerbach Publications

Product Search