Legal, Ethical & Social Aspects of IT Products

  • Mastering the Five Tiers of Audit Competency

    The Essence of Effective Auditing

    By Ann Butera

    Unlike compliance and Sarbanes-Oxley audits, risk-based operational audits and performance audits require a broad array of competencies. This is a book for auditors and risk professionals who want to improve their results during risk-based audits. Each section of this self-help book is devoted to a…

    Paperback – 2016-05-17 
    Auerbach Publications
    Internal Audit and IT Audit

  • Protocols for Secure Electronic Commerce, Third Edition

    By Mostafa Hashem Sherif

    The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this…

    Hardback – 2016-05-11 
    CRC Press

  • Enterprise Level Security

    Securing Information Systems in an Uncertain World

    By William R. Simpson

    Increasing complexity and new computing hardware and techniques have made the fortress approach to security espoused by NIST and implemented throughout the defense and banking industry unworkable. This book provides a modern alternative to this approach. The new approach to security is more…

    Hardback – 2016-04-29 
    Auerbach Publications

  • Software Quality Assurance

    Integrating Testing, Security, and Audit

    By Abu Sayed Mahfuz

    This book demystifies the ISO 17799 standards with practical examples from real-world experience. It defines all kinds of testing, recognizes the factors that propose value to software quality, and provides theoretical and real-world scenarios. The practical synopsis on common testing tools will…

    Hardback – 2016-04-25 
    Auerbach Publications
    Internal Audit and IT Audit

  • The Complete Guide to CyberSecurity Risks and Controls

    By Anne Kohnke, Dan Shoemaker, Ken E. Sigler

    The Complete Guide to CyberSecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day…

    Hardback – 2016-04-18 
    Auerbach Publications
    Internal Audit and IT Audit

  • Circuits and Systems for Security and Privacy

    Edited by Farhana Sheikh, Leonel Sousa

    Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of…

    Hardback – 2016-04-15 
    CRC Press
    Devices, Circuits, and Systems

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    This book introduces readers to how vulnerabilities in computer networks can be exploited by intruders through sending mass requests beyond the capacity of the system. It explains in a practical manner how an attacker develops a tool to launch DDoS attacks of various types by compromising a large…

    Hardback – 2016-04-11 
    Chapman and Hall/CRC

  • Analyzing and Securing Social Networks

    By Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan, Vaibhav Khadilkar, Satyen Abrol, Raymond Heatherly

    Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of…

    Hardback – 2016-04-08 
    Auerbach Publications

  • Conflict in Cyber Space

    Theoretical, Strategic and Legal Pespectives

    Edited by Karsten Friis, Jens Ringsmose

    Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities. Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities…

    Hardback – 2016-04-08 
    Routledge
    Routledge Studies in Conflict, Security and Technology

  • Information Security Policies, Procedures, and Standards

    A Practitioner's Reference

    By Douglas Landoll

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the…

    Hardback – 2016-04-07 
    Auerbach Publications

  • An Introduction to Cyberpsychology

    Edited by Irene Connolly, Marion Palmer, Hannah Barton, Gráinne Kirwan

    An Introduction to Cyberpsychology is the first book to provide a student-oriented introduction to this rapidly growing and increasingly studied topic. It is designed to encourage students to critically evaluate the psychology of online interactions, and to develop appropriate research…

    Paperback – 2016-03-31 
    Routledge

  • Giddens and Castells

    A Comparative Critique

    By Daniel Chaffee

    Hardback – 2016-03-31 
    Routledge
    Routledge Advances in Sociology

Product Search