Legal, Ethical & Social Aspects of IT Products

  • Certified Security by Design Using Higher Order Logic

    By Shiu-Kai Chin, Susan Older

    This textbook serves the needs of engineers and computer scientists responsible for designing, implementing, and verifying secure computer and information systems. Methods are based on the application of logic as a means for describing, reasoning about, and verifying the properties of systems. We…

    Hardback – 2019-02-15 
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • The Complete Guide for CISA Examination Preparation

    By Richard E. Cascarino

    The Complete Guide for CISA Examination Success delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author, an IT security and auditing expert, book covers all five exam domains. This effective self-study system features…

    Paperback – 2019-02-15 
    Auerbach Publications
    Internal Audit and IT Audit

  • Human Performance, Workload, and Situational Awareness Measures Handbook, Third Edition - 2-Volume Set

    3rd Edition

    By Valerie Jane Gawron

    This new third edition handbook provides researchers and practitioners with measures to be used in the evaluation of human/machine systems. The 2-volume set begins with an overview of the steps involved in developing a test to measure human performance, workload, and/or situational awareness, in…

    Hardback – 2019-01-17 
    CRC Press

  • Human Performance and Situation Awareness Measures

    3rd Edition

    By Valerie Jane Gawron

    This book was developed to help researchers and practitioners select measures to be used in the evaluation of human/machine systems. The book begins with an overview of the steps involved in developing a test to measure human performance. This is followed by a definition of human performance and a…

    Hardback – 2019-01-17 
    CRC Press

  • Workload Measures

    3rd Edition

    By Valerie Jane Gawron

    This book was developed to help researchers and practitioners select measures to be used in the evaluation of human/machine systems. The book includes definitions of human workload and situational awareness and a review of measures. Each measure is described, along with its strengths and…

    Hardback – 2019-01-17 
    CRC Press

  • The Death of Web 2.0

    Ethics, Connectivity and Recognition in the Twenty-First Century

    By Greg Singh

    With all of our contemporary connectivity, are we really connected? What does the nature of connectivity tell us about interpersonal and community relationships? What ethical concerns are raised through an always-on culture? Communication in today’s world is characterised by a condition of…

    Paperback – 2018-12-21 
    Routledge

  • The Insider Threat

    Assessment and Mitigation of Risks

    By Eleanor E. Thompson

    This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This…

    Hardback – 2018-12-20 
    Auerbach Publications

  • CISO COMPASS

    Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

    By Todd Fitzgerald

    The book will provide direction for leading an information security program from the perspective of the Chief Information Security Officer (CISO). The book will flow as a 'roadmap' or 'how-to-book' regarding the important areas for the CISO to consider when building and sustaining an information…

    Hardback – 2018-12-10 
    Auerbach Publications

  • Cryptographic and Information Security Approaches for Images and Videos

    By S. Ramakrishnan

    This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application…

    Hardback – 2018-12-03 
    CRC Press

  • Computer and Cyber Security

    Principles, Algorithm, Applications, and Perspectives

    Edited by Brij B. Gupta

    This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of…

    Hardback – 2018-12-03 
    Auerbach Publications

  • CIO's Guide to Security Incident Management

    By Matthew William Arthur Pemble, Wendy Fiona Goucher

    This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan…

    Hardback – 2018-11-12 
    Auerbach Publications

  • Security for Software Engineers

    By James N. Helfrich

    Society has the need for secure software tools. Unfortunately, many of these tools are not built with security in mind or are not developed with attention to security issues. If all software engineers were fluent in the principles described in this book, security breaches and malware outbreaks…

    Hardback – 2018-11-07 
    Chapman and Hall/CRC

Product Search