Skip to main content

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Recommended For You

Loading...

Science & Technology eBooks

If you like Science & Technology eBooks, then you'll love these top picks.
Showing 1 - 24 of 1456 Results
Skip side bar filters
  • Culture Clash

    Law and Science in America

    It is an article of faith in America that scientific advances will lead to wondrous progress in our daily lives. Americans proudly support scientific research that yields stunning breakthroughs and Nobel prizes. We relish the ensuing debate about the implications—moral, ethical, practical—of these advances. Will genetic engineering change our basic nature? Will artificial intelligence challenge ... Read more

    Free

  • Legal Alchemy

    The Use and Misuse of Science in the Law

    Is scientific information misused by this country's court system and lawmakers? Today more than ever before, lawyers, politicians, and government administrators are forced to wrestle with scientific research and to employ scientific thinking. The results are often less than enlightened.In Legal Alchemy, David Faigman explores the ways the American legal system incorporates scientific knowledge ... Read more

    $11.99 USD

  • The Labyrinth of Technology

    A Preventive Technology and Economic Strategy as a Way Out

    Series series Heritage
    Why does modern technology succeed so brilliantly in some respects and simultaneously fail in others? While he was completing a doctoral thesis in mechanical engineering in the late 60s and early 70s, Willem Vanderburg became convinced that the environmental crisis and the possible limits to growth would require a fundamental change in the engineering, management and regulation of technology.In ... Read more

    $35.99 USD

  • Telecommunications Law in the Internet Age

    For companies in and around the telecommunications field, the past few years have been a time of extraordinary change-technologically and legally. The enacting of the Telecommunications Act of 1996 and the development of international trade agreements have fundamentally changed the environment in which your business operates, creating risks, responsibilities, and opportunities that were not there ... Read more

    $106.99 USD

  • Building an Information Security Awareness Program

    In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what ca ... Read more

    $125.99 USD

  • The Privacy Papers

    Managing Technology, Consumer, Employee and Legislative Actions

    Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response marketing, privacy of financial and health records, ... Read more

    $58.99 USD

  • Securing Windows NT/2000

    From Policies to Firewalls

    In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From ... Read more

    $125.99 USD

  • The GigaLaw Guide to Internet Law

    The One-Stop Legal Resource for Conducting Business Online

    by Doug Isenberg ...
    Advance praise for The GigaLaw Guide to Internet Law“I read this book from cover to cover. The examples of case law are of enormous illustrative value. Some of them will raise your blood pressure (well, mine went up several notches, anyway). Well worth the time to read!”—Vint Cerf, chairman, Internet Corporation for Assigned Names and Numbers (ICANN)“Doug Isenberg pulls off the toughest hat trick ... Read more

    $13.99 USD

  • The Laws of Software Process

    A New Model for the Production and Management of Software

    Within one generation, software has become one of the principal sources of wealth in the world. The development and use of software has grown faster than for any artifact in the history of the world. Probably no topic or subject in history has accelerated in its rate of practice as software has. Software development now needs to mature into a disciplined activity to overcome the difficulties that ... Read more

    $110.99 USD

  • The Hacker's Handbook

    The Strategy Behind Breaking into and Defending Networks

    This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. ... Read more

    $150.99 USD

  • Public Key Infrastructure

    Building Trusted Applications and Web Services

    by John R. Vacca ...
    With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act ... Read more

    $74.99 USD

  • Information Security Policies and Procedures

    A Practitioner's Reference, Second Edition

    Information Security Policies and Procedures: A Practitioner‘s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how securi ... Read more

    $150.99 USD

  • Assessing and Managing Security Risk in IT Systems

    A Structured Methodology

    by John McCumber ...
    This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual ... Read more

    $94.99 USD

  • The Digital Person

    Technology and Privacy in the Information Age

    Series Book 1 - Ex Machina: Law, Technology, and Society
    A startling account of personal data dossiers and the newest grave threat to privacySeven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of ... Read more

    $26.99 USD

  • Laboratory of Justice

    The Supreme Court's 200-Year Struggle to Integrate Science and the Law

    From the American Revolution to the genetic revolution, to race and abortion rights, legal expert David L. Faigman’s Laboratory of Justice examines the U.S. Supreme Court’s uneasy attempts to weave science into the Constitution.Suppose that scientists identify a gene that predicts that a person is likely to commit a serious crime. Laws are then passed making genetic tests mandatory, and anyone ... Read more

    $11.99 USD

  • Database and Applications Security

    Integrating Information Security and Data Management

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, ... Read more

    $150.99 USD

  • Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

    Edited by Susan Hansche ...
    Series series (ISC)2 Press
    The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certifica ... Read more

    $58.99 USD

  • Enterprise Security Architecture

    A Business-Driven Approach

    Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive. The book is based ... Read more

    $69.99 USD

  • Peers, Pirates, and Persuasion

    Rhetoric in the Peer-to-Peer Debates

    by John Logie ...
    John Logie examines the rhetoric of the ongoing debate over peer-to-peer technologies, in particular Napster and its successors. The Grokster case, he contends, has already produced the chilling effects that will stifle the innovative spirit at the heart of the Internet and networked communities. ... Read more

    $14.99 USD or Free with Kobo Plus

  • Colossus:The secrets of Bletchley Park's code-breaking computers

    The secrets of Bletchley Park's code-breaking computers

    At last - the secrets of Bletchley Park's powerful codebreaking computers.This is a history of Colossus, the world's first fully-functioning electronic digital computer. Colossus was used during the Second World War at the Government Code and Cypher School at Bletchley Park, where it played an invaluable role cracking enemy codes. Until very recently, much about the Colossus machine was shrouded ... Read more

    $33.99 USD

  • Organizational Crisis Management

    The Human Factor

    by Gerald Lewis ...
    Organizational Crisis Management: The Human Factor offers theoretical background and practical strategies for responding to workplace crises. Responding to a paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reacti ... Read more

    $160.99 USD

  • No Magic Wand

    The Idealization of Science in Law

    Since 1993, Supreme Court precedent has asked judges to serve as gatekeepers to their expert witnesses, admitting only reliable scientific testimony. Lacking a strong background in science, however, some judges admit dubious scientific testimony packages by articulate practitioners, while others reject reliable evidence that is unreasonably portrayed as full of holes. Seeking a balance between ... Read more

    $40.99 USD

  • Security in Distributed, Grid, Mobile, and Pervasive Computing

    by Yang Xiao ...
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses ... Read more

    Free

  • The Secret Circuit

    The Little-Known Court Where the Rules of the Information Age Unfold

    Imagine a high impact, low profile, nonpartisan government institution located across the street from the White House. Imagine that it plays a central role in shaping our technology industries, in overseeing globalization, and in holding the federal government responsible for its commercial activities. Imagine that only Congress and the Supreme Court can correct its mistakes. Such an institution ... Read more

    $51.99 USD