Legal, Ethical & Social Aspects of IT Products

  • Functional Reverse Engineering of Machine Tools

    1st Edition

    Edited by Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain, Cedric Aimal Edwin

    The purpose of this book is to develop capacity building in strategic and non-strategic machine tool technology. The book contains chapters on how to functionally reverse engineer strategic and non-strategic computer numerical control machinery. Numerous engineering areas, such as mechanical…

    Hardback – 2019-10-11
    CRC Press
    Computers in Engineering Design and Manufacturing

  • Botnets

    Architectures, Countermeasures, and Challenges, 1st Edition

    Edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou

    This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters…

    Hardback – 2019-10-08
    CRC Press
    Series in Security, Privacy and Trust

  • Data Driven Approaches for Healthcare

    Machine learning for Identifying High Utilizers, 1st Edition

    By Chengliang Yang, Chris Delcher, Elizabeth Shenkman, Sanjay Ranka

    Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes. Predicting health outcomes using data modeling approaches is an emerging field that can reveal important insights into…

    Hardback – 2019-10-07
    Chapman and Hall/CRC
    Chapman & Hall/CRC Big Data Series

  • The IoT Architect's Guide to Attainable Security and Privacy

    1st Edition

    By Damilare D. Fagbemi, David M Wheeler, JC Wheeler

    This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of…

    Hardback – 2019-10-04
    Auerbach Publications

  • The Politics and Policies of Big Data

    Big Data, Big Brother?, 1st Edition

    Edited by Ann Rudinow Sætnan, Ingrid Schneider, Nicola Green

    Big Data, gathered together and re-analysed, can be used to form endless variations of our persons - so-called ‘data doubles’. Whilst never a precise portrayal of who we are, they unarguably contain glimpses of details about us that, when deployed into various routines (such as management, policing…

    Paperback – 2019-09-30
    Routledge

  • Designing Robot Behavior in Human-Robot Interactions

    1st Edition

    By Changliu Liu, Te Tang, Hsien-Chung Lin, Masayoshi Tomizuka

    In this book, we have set up a unified analytical framework for various human-robot systems, which involve peer-peer interactions (either space-sharing or time-sharing) or hierarchical interactions. A methodology in designing the robot behavior through control, planning, decision and learning is…

    Hardback – 2019-09-25
    CRC Press

  • Introduction to Privacy-Preserving Data Publishing

    Concepts and Techniques, 1st Edition

    By Benjamin C.M. Fung, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu

    Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of…

    Paperback – 2019-09-19
    Chapman and Hall/CRC

  • Computer Forensics

    Evidence Collection and Management, 1st Edition

    By Robert C. Newman

    Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and…

    Paperback – 2019-09-19
    Auerbach Publications

  • Network Perimeter Security

    Building Defense In-Depth, 1st Edition

    By Cliff Riggs

    Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are…

    Paperback – 2019-09-19
    Auerbach Publications

  • How to Achieve 27001 Certification

    An Example of Applied Compliance Management, 1st Edition

    By Sigurjon Thor Arnason, Keith D. Willett

    The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process. Using security standards ISO 17799 and ISO 27001 as a basis, How to Achieve 27001 Certification:…

    Paperback – 2019-09-19
    Auerbach Publications

  • Building an Effective Information Security Policy Architecture

    1st Edition

    By Sandy Bacik

    Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A…

    Paperback – 2019-09-19
    CRC Press

  • Wireless Crime and Forensic Investigation

    1st Edition

    By Gregory Kipper

    Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems,…

    Paperback – 2019-09-19
    Auerbach Publications

Product Search