Legal, Ethical & Social Aspects of IT Products

  • Security and Privacy in Internet of Things (IoTs)

    Models, Algorithms, and Implementations

    By Fei Hu

    IoT security refers to the safeguarding of connected devices and networks in the Internet of Things (IoT). This book covers the critical models, algorithms and implementations in security and privacy designs of IoTs. It specifically covers the following topics: (1) the attack models of IoTs, (2)…

    Hardback – 2016-02-23 
    CRC Press

  • Governance, Risk, and Compliance for PKI Operations

    By Jeff Stapleton, W. Clay Epstein

    Pragmatically, a PKI is an operational system that employs asymmetric cryptography, information technology, operating rules, physical and logical security, and legal matters. Much like any technology, cryptography in general undergoes changes: sometimes evolutionary, sometimes dramatically, and…

    Hardback – 2016-02-18 
    Auerbach Publications

  • CyberSecurity

    A Guide to the National Initiative for Cybersecurity Education (NICE) Framework (2.0)

    By Dan Shoemaker, Anne Kohnke, Ken Sigler

    This book explains the Department of Homeland Security (DHS) National Initiative for Cybersecurity Education (NICE) Framework (2.0). It is aimed at ensuring Bloom level two "comprehension" of the total concept and elements of the NICE model, and serve as the necessary guide to the content areas.…

    Hardback – 2016-02-08 
    Auerbach Publications
    Internal Audit and IT Audit

  • Managing Cyber Risk in the Financial Sector

    Lessons from Asia, Europe and the USA

    Edited by Ruth Taplin

    Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of…

    Hardback – 2016-02-05 
    Routledge Studies in the Growth Economies of Asia

  • Network Security and Communication Engineering

    Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25–26, 2014

    Edited by Kennis Chan

    The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest…

    Hardback – 2016-01-31 
    CRC Press

  • Automated Essay Scoring

    A Cross-disciplinary Perspective

    Edited by Mark D. Shermis, Jill C. Burstein

    This new volume is the first to focus entirely on automated essay scoring and evaluation. It is intended to provide a comprehensive overview of the evolution and state-of-the-art of automated essay scoring and evaluation technology across several disciplines, including education, testing and…

    Paperback – 2016-01-31 

  • Audit Education

    Edited by Karen A. Van Peursem, Elizabeth A. Monk, Richard M.S. Wilson, Ralph W. Adler

    Audit professionals are valued members of society and are expected to be both skilled and ethical in their decision-making. The role of the auditor extends far beyond that of counting beans by demanding a social and political awareness, a technical knowledge, ethical principles and relationship…

    Paperback – 2016-01-28 
    Special issue books from 'Accounting Education: an international journal'

  • Perspectives on Information

    Edited by Magnus Ramage, David Chapman

    Information is everywhere, and defines everything in today's society. Moreover, information is a key concept in a wide range of academic disciplines, from quantum physics to public policy. However, these disciplines all interpret the concept in quite different ways. This book looks at information…

    Paperback – 2016-01-20 
    Routledge Studies in Library and Information Science

  • The Cognitive Early Warning Predictive System Using the Smart Vaccine

    The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure

    By Rocky Termanini

    Here’s an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously survived smallpox did not contract the disease a second time. In fact, these survivors were often called upon to attend to those afflicted with smallpox. Consider this book…

    Hardback – 2016-01-05 
    Auerbach Publications

  • Honeypots and Routers

    Collecting Internet Attacks

    By Mohssen Mohammed, Habib-ur Rehman

    As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy…

    Hardback – 2015-12-30 
    Auerbach Publications

  • Encyclopedia of Information Systems and Technology - Two Volume Set

    Edited by Phillip A. Laplante

    Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology.The topics covered in this encyclopedia encompass internationally…

    Hardback – 2015-12-22 
    CRC Press

  • Cybercrime in Progress

    Theory and prevention of technology-enabled offenses

    By Thomas J Holt, Adam M Bossler

    The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these issues has increased dramatically over the last decade, as have studies on ways to prevent and police…

    Hardback – 2015-12-22 
    Crime Science Series

Product Search