Legal, Ethical & Social Aspects of IT Products

  • Military Applications of Data Analytics

    Edited by Kevin Huggins

    The military produces, senses, and consumes a tremendous amount of data.  Developing ways to effectively leverage these troves of data to enhance operations is a persistent goal.  This book explores data analytics techniques that military scientists and practitioners around the world are…

    Hardback – 2018-10-15 
    Auerbach Publications
    Data Analytics Applications

  • Implementing Cybersecurity: How to Use Security Concepts and Street Smarts to Secure Your IT Systems

    How to Use Security Concepts and Street Smarts to Secure Your IT Systems

    By Jim Litchko

    This book shows how to use cybersecurity concepts and "street skills" effectively to implement security for your information technology (IT) systems. It explains how to use the automated tools available; how to tailor security controls; how to gain additional resources and support; and how to…

    Paperback – 2018-10-01 
    Auerbach Publications

  • Building and Implementing a Risk Management Framework Program

    A Guide to RMF and CAP Certification

    By Jim Litchko

    Hardback – 2018-10-01 
    Auerbach Publications

  • Introduction to Public Key Cryptography

    By Hu Xiong

    In addition to laying the foundation for today’s online security industry, PKC made encryption technologies accessible to individuals and companies. In view of the many achievements of PKC, it should be accessible to most people. Yet, it is difficult to get a unified account of the evolution of PKC…

    Hardback – 2018-10-01 
    Auerbach Publications

  • Auditor Essentials

    100 Concepts, Tools and Techniques for Success

    By Hernan Murdock

    Paperback – 2018-10-01 
    Auerbach Publications
    Internal Audit and IT Audit

  • The Politics and Technology of Cybersecurity

    By Daniel Steed

    Cyberspace is a deeply technical and political area with daily reminders, from small businesses through to national institutions, of the risks it presents. Since IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar Cybersecurity is and will…

    Hardback – 2018-08-15 
    Modern Security Studies

  • Behavioral and Technological Addictions

    Selected Works of Mark Griffiths

    By Mark Griffiths

    Mark Griffiths is Director of the International Gaming Research Unit at Nottingham Trent University and one of the foremost experts on the psychology of addictive behaviors, particularly gambling and excessive internet use. A Fellow of the British Psychological Society and the Royal Society of Arts…

    Hardback – 2018-08-03 
    World Library of Psychologists

  • The Science of Biometrics

    Security Technology for Identity Verification

    By Ravindra Das

    The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter…

    Paperback – 2018-07-19 

  • e-HRM

    Digital Approaches, Directions & Applications

    Edited by Mohan Thite

    As with other parts of business, technology is having a profound effect on the world of work and management of human resources. Technology is a key enabler for faster, cheaper and better delivery of HR services and in some cases can have a transformational as well as unintended negative effect.…

    Paperback – 2018-07-19 

  • Surveillance, Privacy and Public Space

    Edited by Bryce Clayton Newell, Tjerk Timan, Bert-Jaap Koops

    Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of…

    Hardback – 2018-07-18 
    Routledge Studies in Surveillance

  • Handbook of e-Business Security

    Edited by João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari

    There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and…

    Hardback – 2018-07-17 
    Auerbach Publications

  • Digital Privacy, Terrorism and Law Enforcement

    The UK's Response to Terrorist Communication

    By Simon Hale-Ross

    This book examines the UK’s response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies,…

    Hardback – 2018-07-10 
    Routledge Research in Terrorism and the Law

Product Search