Legal aspects of computing books

2318 books were found.

The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers

The Future of Identity in the Information Society: 4th...

Author: Vashek Matyáš ,  Simone Fischer-Hübner
ISBN: 9783642242311
Format: Paperback
$290.37

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally...  Read More >>

Software Engineering: The Current Practice

Software Engineering: The Current Practice

Author: Vaclav Rajlich
ISBN: 9781439841228
Format: Hardback
$189.00

Software Engineering: The Current Practice teaches students basic software engineering skills and helps practitioners...  Read More >>

Internet and Surveillance: The Challenges of Web 2.0 and Social Media

Internet and Surveillance: The Challenges of Web 2.0...

Author: Christian Fuchs (University of Westminster, UK) ,  Kees Boersma
ISBN: 9780415891608
Format: Hardback
$315.00

The Internet has been transformed in the past years from a system primarily oriented on information provision into...  Read More >>

Security and Privacy in User Modeling

Security and Privacy in User Modeling

Author: J. Schreck
ISBN: 9789048162239
Format: Paperback
$366.96

User-adaptive (or ""personalized"") systems take individual character­ istics of their current users into account...  Read More >>

A dictionary of IT service management terms, acronyms and abbreviations ITIL

A dictionary of IT service management terms, acronyms...

Author: Ashley Hanna ,  itSMF - The IT Service Management Forum
ISBN: 9781906745059
Format: Paperback
$19.41

This newly revised pocket dictionary from itSMF UK contains all the definitions from the ITIL(r) Glossary and Abbreviations...  Read More >>

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Defense against the Black Arts: How Hackers Do What...

Author: Jesse Varsalone ,  Matthew McFadden (Towson, Maryland, USA)
ISBN: 9781439821190
Format: Paperback
$120.00

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack...  Read More >>

Forensics in Telecommunications, Information and Multimedia: Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Forensics in Telecommunications, Information and Multimedia:...

Author: Xuejia Lai ,  Dawu Gu
ISBN: 9783642236013
Format: Paperback
$219.12

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference...  Read More >>

Electronic Government: 10th International Conference, EGOV 2011, Delft, The Netherlands, August 29 -- September 1, 2011, Proceedings

Electronic Government: 10th International Conference,...

Author: Marijn Janssen ,  Hans Jochen Scholl
ISBN: 9783642228773
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 10th International Conference, EGOV 2011, held in Delft, The...  Read More >>

Delete: The Virtue of Forgetting in the Digital Age

Delete: The Virtue of Forgetting in the Digital Age...

Author: Viktor Mayer-Schönberger
ISBN: 9780691150369
Format: Paperback
$34.99

Looks at the phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity...  Read More >>

Privacy and Identity Management for Life

Privacy and Identity Management for Life

Author: Jan Camenisch ,  Simone Fischer-Hübner
ISBN: 9783642203169
Format: Hardback
$630.96

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily...  Read More >>

Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers

Security Protocols XVI: 16th International Workshop,...

Author: Bruce Christianson ,  James Malcolm
ISBN: 9783642221361
Format: Paperback
$190.08

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols,...  Read More >>

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

Legislative XML for the Semantic Web: Principles, Models,...

Author: Giovanni Sartor ,  Monica Palmirani
ISBN: 9789400718869
Format: Hardback
$366.96

It goes on to address such issues as naming, the Akoma-Ntoso document model, the contribution of standard-based...  Read More >>

User Generated Content: Urheberrechtliche Zulässigkeit nutzergenerierter Medieninhalte

User Generated Content: Urheberrechtliche Zulässigkeit...

Author: Christian Alexander Bauer
ISBN: 9783642200670
Format: Hardback
$314.16

Immer mehr Internetnutzer gehen von der klassischen, durch eine passive und reaktive Konsumtion geprägten Mediennutzung...  Read More >>

Lifehacker: The Guide to Working Smarter, Faster, and Better

Lifehacker: The Guide to Working Smarter, Faster, and...

Author: Adam Pash ,  Gina Trapani
ISBN: 9781118018378
Format: Paperback
$79.17

A new edition, packed with even more clever tricks and methods that make everyday life easier Lifehackers redefine...  Read More >>

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings

Intelligence and Security Informatics: Pacific Asia...

Author: Michael Chau ,  G. Alan Wang
ISBN: 9783642220388
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics,...  Read More >>

iPad 2 Fur Dummies

iPad 2 Fur Dummies

Author: Edward C. Baig ,  Bob LeVitus
ISBN: 9783527707010
Format: Paperback
$46.20

Alles in einem: iPod touch, MacBook und eReader? Das iPad packt die beliebtesten Funktionen in ein tragbares Gerat...  Read More >>

Official (ISC)2 Guide to the CSSLP

Official (ISC)2 Guide to the CSSLP

Author: Mano Paul (SecuRisk Solutions, Pflugerville, Texas, USA)
ISBN: 9781439826058
Format: Hardback
$221.00

As the global leader in information security education and certification, (ISC)2(R) has a proven track record of...  Read More >>

Introduction to Security and Network Forensics

Introduction to Security and Network Forensics

Author: William J. Buchanan
ISBN: 9780849335686
Format: Hardback
$120.00

Presents information in forensic computing and IT security. This volume offers practical insight to security and...  Read More >>

Introduction to Cryptography with Open-Source Software

Introduction to Cryptography with Open-Source Software...

Author: Alasdair McAndrew
ISBN: 9781439825709
Format: Hardback
$189.00

 Read More >>

Software IP Detective's Handbook, The: Measurement, Comparison, and Infringement Detection

Software IP Detective's Handbook, The: Measurement,...

Author: Bob Zeidman
ISBN: 9780137035335
Format: Paperback
$131.97

“Intellectual property, software plagiarism, patents, and copyrights are complicated subjects. This book explains...  Read More >>

Perspectives on Information

Perspectives on Information

Author: Magnus Ramage ,  David Chapman
ISBN: 9780415884105
Format: Hardback
$315.00

 Read More >>

Security Patch Management

Security Patch Management

Author: Felicia Nicastro
ISBN: 9781439824993
Format: Hardback
$189.00

 Read More >>

Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List