Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

Buy

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing technologies and ever-changing communication ecosystems.

This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies.

Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book.

This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.

(HTML tags aren't allowed.)

Introducing Windows 8.1 for IT Professionals
Introducing Windows 8.1 for IT Professionals

NOTE: This title is also available as a free eBook. It is offered for sale in print format as a convenience.

Get a head start evaluating Windows 8.1 - with early technical insights from award-winning journalist and Windows expert Ed Bott. Based on the Windows 8.1 Preview release, this guide introduces new features and capabilities,...

The Human Gut-Liver-Axis in Health and Disease
The Human Gut-Liver-Axis in Health and Disease

The book brings together the current knowledge and future perspectives of the complex physiology and pathophysiology of gut-liver interactions in health and disease. It provides readers with a unique overview and access to knowledge that cannot be obtained elsewhere.

The structure is logical and covers all aspect...

Foundations of SQL Server 2005 Business Intelligence
Foundations of SQL Server 2005 Business Intelligence
Just as every business needs to effectively employ Business Intelligence (BI) to stay competitive, every IT professional needs to master BI to stay employed in this fastest-growing segment of Information Technology. Foundations of SQL Server 2005 Business Intelligence is the quickest path to understanding BI, and it is essential reading...

Beginning Django: Web Application Development and Deployment with Python
Beginning Django: Web Application Development and Deployment with Python
Discover the Django web application framework and get started building Python-based web applications. This book takes you from the basics of Django all the way through to cutting-edge topics such as creating RESTful applications. Beginning Django also covers ancillary, but essential, development topics, including...
Probability
Probability

This textbook is ideal for an undergraduate introduction to probability, with a calculus prerequisite. It is based on a course that the author has taught many times at Berkeley. The text's overall style is informal, but all results are stated precisely, and most are proved. Understanding is developed through intuitive explanations and...

Security Warrior
Security Warrior

This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy