Legal, Ethical & Social Aspects of IT Products

  • The Audit Value Factor

    1st Edition

    By Daniel Samson

    The Audit Value Factor: Making Management’s Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization. The book explores how to identify, quantify, and articulate value for customers. It details six critical success factors: Value…

    Paperback – 2019-08-14
    Auerbach Publications
    Internal Audit and IT Audit

  • Blockchain and Web 3.0

    Social, Economic, and Technological Challenges, 1st Edition

    Edited by Massimo Ragnedda, Giuseppe Destefanis

    Blockchain is no longer just about bitcoin or cryptocurrencies in general. Instead, it can be seen as a disruptive, revolutionary technology which will have major impacts on multiple aspects of our lives. The revolutionary power of such technology compares with the revolution sparked by the World…

    Hardback – 2019-07-23
    Routledge
    Routledge Studies in Science, Technology and Society

  • Why Don't We Defend Better?

    Data Breaches, Risk Management, and Public Policy, 1st Edition

    By Robert H. Sloan, Richard Warner

    The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three…

    Hardback – 2019-07-15
    CRC Press

  • The Politics of Data Transfer

    Transatlantic Conflict and Cooperation over Data Privacy, 1st Edition

    By Yuko Suda

    In this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States. She argues that the Safe…

    Paperback – 2019-07-12
    Routledge

  • Inside the Dark Web

    1st Edition

    By Erdal Ozkaya, Rafiqul Islam

    Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime…

    Paperback – 2019-07-03
    CRC Press

  • Fundamentals of Internet of Things for Non-Engineers

    1st Edition

    Edited by Rebecca Lee Hammons, Ronald J. Kovac

    The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers, progressed to connecting people to people, and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare, excitement, and cheering. We’re now…

    Paperback – 2019-06-25
    Auerbach Publications
    Technology for Non-Engineers

  • Vulnerability Management

    2nd Edition

    By Park Foreman

    Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek…

    Hardback – 2019-06-25
    Auerbach Publications

  • Gendered Power and Mobile Technology

    Intersections in the Global South, 1st Edition

    Edited by Caroline Wamala Larsson, Laura Stark

    Mobile phones are widely viewed as the information and communication technology that holds the most promise for bridging global digital divides. Gendered Power and Mobile Technology uses empirical research to focus on changing intersections between technology, gender and other categories of social…

    Hardback – 2019-06-18
    Routledge
    Routledge Advances in Feminist Studies and Intersectionality

  • The Politics and Technology of Cyberspace

    1st Edition

    By Danny Steed

    Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical…

    Hardback – 2019-06-14
    Routledge
    Modern Security Studies

  • Software Deployment, Updating, and Patching

    1st Edition

    By Bill Stackpole, Patrick Hanrion

    The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training…

    Paperback – 2019-06-12
    CRC Press

  • Implementing Digital Forensic Readiness

    From Reactive to Proactive Process, Second Edition, 2nd Edition

    By Jason Sachowski

    Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically…

    Hardback – 2019-06-05
    CRC Press

  • Emerging Security Algorithms and Techniques

    1st Edition

    Edited by Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh

    Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion)…

    Hardback – 2019-06-04
    Chapman and Hall/CRC

Product Search