Legal aspects of computing books

2045 books were found.

Web Security: A WhiteHat Perspective

Web Security: A WhiteHat Perspective

Author: Hanqing Wu ,  Liz Zhao
ISBN: 9781138436848
Format: Hardback
$439.87

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target  Read More >>

Pornography and The Criminal Justice System

Pornography and The Criminal Justice System

Author: Carmen M. Cusack (Keiser University, Miami, Florida, USA)
ISBN: 9781138415744
Format: Hardback
$378.00

This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the...  Read More >>

A Technical Guide to IPSec Virtual Private Networks

A Technical Guide to IPSec Virtual Private Networks...

Author: James S. Tiller (Raleigh, North Carolina, USA)
ISBN: 9781138453593
Format: Hardback
$414.00

Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and...  Read More >>

Secure Java: For Web Application Development

Secure Java: For Web Application Development

Author: Abhay Bhargav ,  B. V. Kumar
ISBN: 9781138436954
Format: Hardback
$368.00

As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers...  Read More >>

Network and Application Security: Fundamentals and Practices

Network and Application Security: Fundamentals and Practices...

Author: Debashis Ganguly (Systems Engineer, Infosys Technologies Ltd., India)
ISBN: 9781138453609
Format: Hardback
$389.00

To deal with security issues effectively, knowledge of theories alone is not sufficient  Read More >>

Unauthorized Access: The Crisis in Online Privacy and Security

Unauthorized Access: The Crisis in Online Privacy and...

Author: Robert Sloan ,  Richard Warner
ISBN: 9781138436923
Format: Hardback
$368.00

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security...  Read More >>

Physical Security and Safety: A Field Guide for the Practitioner

Physical Security and Safety: A Field Guide for the...

Author: Truett A. Ricks ,  Bobby E. Ricks
ISBN: 9781138430907
Format: Hardback
$378.00

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner...  Read More >>

Information Security Fundamentals

Information Security Fundamentals

Author: Thomas R. Peltier
ISBN: 9781138436893
Format: Hardback
$439.87

 Read More >>

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Defense against the Black Arts: How Hackers Do What...

Author: Jesse Varsalone ,  Matthew McFadden
ISBN: 9781138453616
Format: Hardback
$378.00

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack...  Read More >>

Security De-Engineering: Solving the Problems in Information Risk Management

Security De-Engineering: Solving the Problems in Information...

Author: Ian Tibble
ISBN: 9781138440388
Format: Hardback
$414.00

First Published in 1994. Routledge is an imprint of Taylor & Francis, an informa company.  Read More >>

Building A Global Information Assurance Program

Building A Global Information Assurance Program

Author: Raymond J Curts (Strategic Consulting, Fairfax Station, Virginia, USA) ,  Douglas E. Campbell (Syneca Research Group Inc., Fairfax, Virginia, USA)
ISBN: 9781138437005
Format: Hardback
$414.00

Suitable for those interested in the construction and operation of an information assurance (IA) program, this book...  Read More >>

Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers

Author: Peter T. Davis (Peter Davis & Associates, Toronto, Ontario, Canada)
ISBN: 9781138436992
Format: Hardback
$414.00

Demonstrates techniques for strengthening network security. The book provides an introduction to Cisco technology...  Read More >>

Ethics and the Internal Auditor's Political Dilemma: Tools and Techniques to Evaluate a Company's Ethical Culture

Ethics and the Internal Auditor's Political Dilemma:...

Author: Lynn Fountain (Consulting, Business Advisory and Training, Overland Park, Kansas, USA)
ISBN: 9781138436817
Format: Hardback
$368.00

This book helps auditors understand the reality of performing the internal audit role and the importance of properly...  Read More >>

Cyber Security Essentials

Cyber Security Essentials

Author: James Graham (Verisign iDefense Security Intelligence Services, Dulles, Virginia, USA) ,  Ryan Olson (Verisign iDefense Security Intelligence Services, Dulles, Virginia, USA)
ISBN: 9781138440401
Format: Hardback
$414.00

A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as...  Read More >>

Security Strategy: From Requirements to Reality

Security Strategy: From Requirements to Reality

Author: Bill Stackpole (Microsoft Corporation, Redmond, Washington, USA) ,  Eric Oksendahl (Port Orchard, Washington, USA)
ISBN: 9781138440463
Format: Hardback
$439.87

Addressing the diminished understanding of the value of security on the executive side and a lack of good business...  Read More >>

Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing

Mastering the Five Tiers of Audit Competency: The Essence...

Author: Ann Butera (The Whole Person Project, Inc., Elmont, New York, USA)
ISBN: 9781138409330
Format: Hardback
$378.00

Risk-based operational audits and performance audits require a broad array of competencies  Read More >>

Managing A Network Vulnerability Assessment

Managing A Network Vulnerability Assessment

Author: Thomas R. Peltier (Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA) ,  Justin Peltier (Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA)
ISBN: 9781138436886
Format: Hardback
$414.00

Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps...  Read More >>

A History of Cyber Security Attacks: 1980 to Present

A History of Cyber Security Attacks: 1980 to Present...

Author: Bruce Middleton
ISBN: 9781498785860
Format: Hardback
$197.87

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable...  Read More >>

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Author: Rafay Baloch
ISBN: 9781138436824
Format: Hardback
$439.87

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction...  Read More >>

Responsive Security: Be Ready to Be Secure

Responsive Security: Be Ready to Be Secure

Author: Meng-Chow Kang
ISBN: 9781138436855
Format: Hardback
$368.00

Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information...  Read More >>

Vein Pattern Recognition: A Privacy-Enhancing Biometric

Vein Pattern Recognition: A Privacy-Enhancing Biometric...

Author: Chuck Wilson
ISBN: 9781138115316
Format: Paperback
$67.99

Exploring privacy issues and the general concept of personal identity, this book delves into real-world biometrics...  Read More >>

Get Certified: A Guide to Wireless Communication Engineering Technologies

Get Certified: A Guide to Wireless Communication Engineering...

Author: Syed A. Ahson (Microsoft Corporation, Bellevue, Washington, USA) ,  Mohammad Ilyas (Florida Atlantic University, Boca Raton, USA)
ISBN: 9781138118164
Format: Paperback
$147.00

Presenting contributions from 50 wireless communications experts from different corners of the world, this title...  Read More >>

Introduction to Contextual Processing: Theory and Applications

Introduction to Contextual Processing: Theory and Applications...

Author: Gregory Vert ,  S. Sitharama Iyengar
ISBN: 9781138112926
Format: Paperback
$147.00

Develops a comprehensive, global model for contextually based processing systems. This title presents a fresh perspective...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List