You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This textbook raises thought-provoking questions regarding our rapidly-evolving computing technologies, highlighting the need for a strong ethical framework in our computer science education. Ethics in Computing offers a concise introduction to this topic, distilled from the more expansive Ethical and Social Issues in the Information Age. Features: introduces the philosophical framework for analyzing computer ethics; describes the impact of computer technology on issues of security, privacy and anonymity; examines intellectual property rights in the context of computing; discusses such issues as the digital divide, employee monitoring in the workplace, and health risks; reviews the history of computer crimes and the threat of cyberbullying; provides coverage of the ethics of AI, virtualization technologies, virtual reality, and the Internet; considers the social, moral and ethical challenges arising from social networks and mobile communication technologies; includes discussion questions and exercises.
This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the f...
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.
This textbook provides an introduction to the social and policy issues which have arisen as a result of information technology. Whilst it assumes a modest familiarity with computers, its aim is to provide a guide to the issues suitable for undergraduates. In doing so, the author prompts the students to consider questions such as: "What are the moral codes of cyberspace?" Throughout, the book shows how in many ways the technological development is outpacing the ability of our legal systems to keep up, and how different paradigms applied to ethical questions may often offer conflicting conclusions. As a result students will find this to be a thought-provoking and valuable survey.
This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; desc...
This textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology—ranging from the Internet, over to the cross-platforms consisting of ubiquitous portable and wearable devices to the eagerly anticipated metaverse—and how we can responsibly access and use these spaces. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life. This comprehensive seventh edition features thoroughly revised chapters with new and updated content, hardened by the bedrock ethical and moral values. Because of the rapidly changing computing and t...
"This fully updated edition of the 2002 Choice Outstanding Academic Title opens with three new chapters introducing morality, ethics, and technology and value. The book focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves"--Provided by publisher.
There is rising concern about the rights of employees, especially with respect to their rights to privacy. Contributes to the debate and will point the way toward some solutions.
Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring.This new, updated, third edition explores security issues also in the world of social networks. General security protocols and best practices have been updated to reflect changes in the cyber world, and the changing business information security landscape is analyzed in detail.Instructors considering this book for use in a course may request an examination copy here.
This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems and social networks. Features: provides supporting material for lecturers and students, including an instructor’s manual, slides, solutions, and laboratory materials; includes both quick and more thought-provoking exercises at the end of each chapter; devotes an entire chapter to laboratory exercises; discusses flaws and vulnerabilities in computer network infrastructures and protocols; proposes practical and efficient solutions to security issues; explores the role of legislation, regulation, and law enforcement in maintaining computer and computer network security; examines the impact of developments in virtualization, cloud computing, and mobile systems.