Legal aspects of computing books

2045 books were found.

Regulating the Collaborative Economy in the European Union Digital Single Market

Regulating the Collaborative Economy in the European...

Author: Marco Inglese
ISBN: 9783030300395
Format: Hardback
$284.60

This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market...  Read More >>

Robots, Healthcare, and the Law: Regulating Automation in Personal Care

Robots, Healthcare, and the Law: Regulating Automation...

Author: Eduard Fosch-Villaronga
ISBN: 9780367076610
Format: Hardback
$242.00

The integration of robotic and artificial intelligent systems in healthcare settings is accelerating.  Read More >>

Das S-Netzwerk und sein wirtschaftliches Potenzial: Die Möglichkeiten des S-Webs und der Jadwirtschaft mit der Einweg-Währung Jad

Das S-Netzwerk und sein wirtschaftliches Potenzial:...

Author: Johannes Viehmann
ISBN: 9783658285043
Format: Paperback
$171.57

 Read More >>

Contractual Management: Managing Through Contracts

Contractual Management: Managing Through Contracts

Author: Ralph Schuhmann ,  Bert Eichhorn
ISBN: 9783662584811
Format: Hardback
$116.41

 Read More >>

EU Internet Law in the Digital Era: Regulation and Enforcement

EU Internet Law in the Digital Era: Regulation and Enforcement...

Author: Tatiana-Eleni Synodinou ,  Philippe Jougleux
ISBN: 9783030255787
Format: Hardback
$527.97

The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found...  Read More >>

Monitoring Laws: Profiling and Identity in the World State

Monitoring Laws: Profiling and Identity in the World...

Author: Jake Goldenfein (Cornell University, New York)
ISBN: 9781108426626
Format: Hardback
$258.75

Traces the history of government profiling, the effects of contemporary technologies on surveillance practices,...  Read More >>

The Ethical Hack: A Framework for Business Value Penetration Testing

The Ethical Hack: A Framework for Business Value Penetration...

Author: James S. Tiller
ISBN: 9780367393816
Format: Paperback
$147.46

"There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate...  Read More >>

Testing Code Security

Testing Code Security

Author: Maura A. van der Linden
ISBN: 9780367389017
Format: Paperback
$147.46

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both...  Read More >>

Understanding and Applying Cryptography and Data Security

Understanding and Applying Cryptography and Data Security...

Author: Adam J. Elbirt
ISBN: 9780367385798
Format: Paperback
$147.46

Emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. This...  Read More >>

Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings

Applications and Techniques in Information Security:...

Author: V. S. Shankar Sriram ,  V. Subramaniyaswamy
ISBN: 9789811508707
Format: Paperback
$116.41

This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques...  Read More >>

Intellectual Property in Electronics and Software: A Global Guide to Rights and Their Applications, 2nd ed

Intellectual Property in Electronics and Software: A...

Author: Nicholas Fox
ISBN: 9781787422049
Format: Hardback
$382.95

This new edition covers the latest case law on open source software and standard essential patents and features...  Read More >>

Decision and Game Theory for Security: 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings

Decision and Game Theory for Security: 10th International...

Author: Tansu Alpcan ,  Yevgeniy Vorobeychik
ISBN: 9783030324292
Format: Paperback
$116.41

This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory...  Read More >>

Botnets: Architectures, Countermeasures, and Challenges

Botnets: Architectures, Countermeasures, and Challenges...

Author: Georgios Kambourakis ,  Marios Anagnostopoulos
ISBN: 9780367191542
Format: Hardback
$242.00

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet...  Read More >>

Data Driven Approaches for Healthcare: Machine learning for Identifying High Utilizers

Data Driven Approaches for Healthcare: Machine learning...

Author: Chengliang Yang ,  Chris Delcher (University of Kentucky, KY, USA)
ISBN: 9780367342906
Format: Hardback
$315.00

This book presents data driven methods, especially machine learning, for understanding and approaching the high...  Read More >>

The ABCs of LDAP: How to Install, Run, and Administer LDAP Services

The ABCs of LDAP: How to Install, Run, and Administer...

Author: Reinhard E. Voglmaier (GlaxoSmithKline SpA, Verona, Italy)
ISBN: 9781138453630
Format: Hardback
$388.12

This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines...  Read More >>

Between Truth and Power: The Legal Constructions of Informational Capitalism

Between Truth and Power: The Legal Constructions of...

Author: Julie E. Cohen (Professor of Law, Professor of Law, Georgetown University)
ISBN: 9780190246693
Format: Hardback
$126.69

Drawing from law, science and technology studies, cultural studies, and information studies to develop a complex...  Read More >>

FISMA Principles and Best Practices: Beyond Compliance

FISMA Principles and Best Practices: Beyond Compliance...

Author: Patrick D. Howard
ISBN: 9780367382902
Format: Paperback
$147.46

In light of the legislation such as the Federal Information Security Management Act (FISMA), there is an increased...  Read More >>

Security of Mobile Communications

Security of Mobile Communications

Author: Noureddine Boudriga
ISBN: 9780367385415
Format: Paperback
$120.00

Covers the complex security issues that face the mobile communications industry. This book discusses hacking and...  Read More >>

Information Assurance Architecture

Information Assurance Architecture

Author: Keith D. Willett
ISBN: 9780367387174
Format: Paperback
$147.46

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring...  Read More >>

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods

Secure and Resilient Software: Requirements, Test Cases,...

Author: Mark S. Merkow ,  Lakshmikanth Raghavan
ISBN: 9780367382148
Format: Paperback
$147.46

Detailing a comprehensive set of requirements for secure and resilient software development and operation, this...  Read More >>

Surviving Security: How to Integrate People, Process, and Technology

Surviving Security: How to Integrate People, Process,...

Author: Amanda Andress
ISBN: 9780367394714
Format: Paperback
$147.46

Previous information security references do not address the gulf between general security awareness and the specific...  Read More >>

Building an Effective Information Security Policy Architecture

Building an Effective Information Security Policy Architecture...

Author: Sandy Bacik
ISBN: 9780367387303
Format: Paperback
$126.00

Information security teams are charged with developing and maintaining a set of documents that will protect the...  Read More >>

Public Key Infrastructure: Building Trusted Applications and Web Services

Public Key Infrastructure: Building Trusted Applications...

Author: John R. Vacca
ISBN: 9780367394325
Format: Paperback
$147.46

By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides...  Read More >>

Computer Forensics: Evidence Collection and Management

Computer Forensics: Evidence Collection and Management...

Author: Robert C. Newman
ISBN: 9780367389376
Format: Paperback
$147.46

Examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers,...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List