Legal aspects of computing books

2045 books were found.

Handbook of Digital and Multimedia Forensic Evidence

Handbook of Digital and Multimedia Forensic Evidence...

Author: John J. Barbara
ISBN: 9781617377754
Format: Paperback
$316.77

Handbook of Digital and Multimedia Forensic Evidence presents an overview of computer forensics perfect for beginners....  Read More >>

Virtual Organizations: Systems and Practices

Virtual Organizations: Systems and Practices

Author: Luis M. Camarinha-Matos ,  Hamideh Afsarmanesh
ISBN: 9781441936578
Format: Paperback
$446.16

A synthesis of results collected from the analysis of numerous projects and industry case studies is presented,...  Read More >>

Reasoning with Rules: An Essay on Legal Reasoning and Its Underlying Logic

Reasoning with Rules: An Essay on Legal Reasoning and...

Author: Jaap Hage
ISBN: 9789048147731
Format: Paperback
$842.16

This book offers an extensive analysis of the role of rules and principles in legal reasoning, which focuses on...  Read More >>

VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security

VizSEC 2007: Proceedings of the Workshop on Visualization...

Author: John R. Goodall ,  Gregory Conti
ISBN: 9783642096884
Format: Paperback
$237.47

VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage...  Read More >>

Mobility, Data Mining and Privacy: Geographic Knowledge Discovery

Mobility, Data Mining and Privacy: Geographic Knowledge...

Author: Fosca Giannotti ,  Dino Pedreschi
ISBN: 9783642094439
Format: Paperback
$290.37

Suitable for those in the related areas of computer science, geography, social science, statistics, law, telecommunications...  Read More >>

EU Digital Copyright Law and the End-User

EU Digital Copyright Law and the End-User

Author: Giuseppe Mazziotti
ISBN: 9783642095092
Format: Paperback
$472.56

In performing all these mus- related activities, I developed a considerable interest for copyright issues and, when...  Read More >>

IP-Enabled Energy Management: A Proven Strategy for Administering Energy as a Service

IP-Enabled Energy Management: A Proven Strategy for...

Author: Rob Aldrich ,  John Parello
ISBN: 9780470607251
Format: Paperback
$131.97

Managing energy usage via a company network allows you to create an energy management program that can be scaled...  Read More >>

The End of Lawyers?: Rethinking the nature of legal services

The End of Lawyers?: Rethinking the nature of legal...

Author: Richard E. Susskind, OBE
ISBN: 9780199593613
Format: Paperback
$44.95

This widely acclaimed legal bestseller has ignited an intense debate within the legal profession. It examines the...  Read More >>

Secure Java: For Web Application Development

Secure Java: For Web Application Development

Author: Abhay Bhargav ,  B. V. Kumar
ISBN: 9781439823514
Format: Paperback
$175.00

As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers...  Read More >>

Nutzergenerierte Inhalte als Gegenstand des Privatrechts: Aktuelle Probleme des Web 2.0

Nutzergenerierte Inhalte als Gegenstand des Privatrechts:...

Author: Henning Große Ruse-Khan ,  Nadine Klass
ISBN: 9783642124105
Format: Hardback
$287.76

Das Phänomen der nutzergenerierten Inhalte, erlangt immer stärkere Bedeutung und stellt das Recht täglich vor neue...  Read More >>

Managing an Information Security and Privacy Awareness and Training Program

Managing an Information Security and Privacy Awareness...

Author: Rebecca Herold (Rebecca Herold, LLC, Van Meter, Iowa, USA)
ISBN: 9781439815458
Format: Hardback
$273.00

Suitable for infosec and privacy education practitioners who are building programs for their organizations, this...  Read More >>

Cloud Computing: A Practical Introduction to the Legal Issues

Cloud Computing: A Practical Introduction to the Legal...

Author: Renzo Marchini
ISBN: 9780580703225
Format: Paperback
$77.63

Introduces cloud computing (briefly) for those new to the concept, comparing the development of this computing paradigm...  Read More >>

Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques

Introduction to Privacy-Preserving Data Publishing:...

Author: Benjamin C.M. Fung ,  Ke Wang
ISBN: 9781420091489
Format: Hardback
$273.00

 Read More >>

de L'Education Chrestienne Des Enfans, Selon (1669)

de L'Education Chrestienne Des Enfans, Selon (1669)...

Author: Alexandre Louis Varet
ISBN: 9781165984091
Format: Hardback
$99.16

This scarce antiquarian book is a selection from Kessinger Publishing's Legacy Reprint Series. Due to its age, it...  Read More >>

Internet of Things: Legal Perspectives

Internet of Things: Legal Perspectives

Author: Rolf H. Weber ,  Romana Weber
ISBN: 9783642117091
Format: Hardback
$340.56

The Internet of Things as an emerging global Internet-based information archit- ture facilitating the exchange of...  Read More >>

Achieving Service–Oriented Architecture: Applying an Enterprise Architecture Approach

Achieving Service–Oriented Architecture: Applying an...

Author: Rick Sweeney
ISBN: 9780470604519
Format: Hardback
$171.60

 Read More >>

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Access Controlled: The Shaping of Power, Rights, and...

Author: Ronald Deibert (Professor of Political Science and Director of the Citizen Lab at the Munk Centre for International , University of Toronto) ,  John Palfrey (Phillips Academy)
ISBN: 9780262514354
Format: Paperback
$71.28

Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and...  Read More >>

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Access Controlled: The Shaping of Power, Rights, and...

Author: Ronald J. Deibert ,  John G. Palfrey
ISBN: 9780262014342
Format: Hardback
$132.00

Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and...  Read More >>

Computer Crime, Investigation, and the Law

Computer Crime, Investigation, and the Law

Author: Chuck Easttom (Independent Consultant) ,  Jeff Taylor
ISBN: 9781435455320
Format: Paperback
$131.97

Offers an introduction to the field of computer crime, discussing the history of computer crime, basic criminal...  Read More >>

Shaping Internet Governance: Regulatory Challenges

Shaping Internet Governance: Regulatory Challenges

Author: Rolf H. Weber ,  Mirina Grosz
ISBN: 9783642046193
Format: Hardback
$366.96

Shaping Internet Governance discusses the main topics of Internet governance, such as legitimacy, transparency,...  Read More >>

Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions

Patent Law for Computer Scientists: Steps to Protect...

Author: Daniel Closa ,  Alex Gardiner
ISBN: 9783642050770
Format: Hardback
$131.87

While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications...  Read More >>

Data Privacy Management and Autonomous Spontaneous Security: 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers

Data Privacy Management and Autonomous Spontaneous Security:...

Author: Joaquin Garcia-Alfaro ,  Guillermo Navarro-Arribas
ISBN: 9783642112065
Format: Paperback
$190.08

This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM...  Read More >>

Legal Management of Information Systems: Incorporating Law in e-Solutions

Legal Management of Information Systems: Incorporating...

Author: Cecilia Magnusson Sjoberg
ISBN: 9789144047430
Format: Paperback
$168.19

In order to fully grasp whether a technical solution is legal or not, one must of course be able to interpret existing...  Read More >>

Information Security in Healthcare: Managing Risk

Information Security in Healthcare: Managing Risk

Author: Terrell W. Herzig
ISBN: 9780982107027
Format: Paperback
$173.00

Information Security in Healthcare is an essential guide for implementing a comprehensive information security management...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List