This is the "New Books" page of the "Information Assurance" guide.
Alternate Page for Screenreader Users
Skip to Page Navigation
Skip to Page Content

Information Assurance  

Last Updated: Oct 17, 2017 URL: http://researchguides.walshcollege.edu/ia Print Guide

New Books Print Page
  Search: 
 
 

New Book Arrivals

Cover Art
Privacy in the Modern Age - Marc Rotenberg; Jeramie Scott (Editor); Julia Horwitz (Editor)
Call Number: JC 596.2 .U5 .P77 2015
ISBN: 9781620971079
Publication Date: 2015-05-12
The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy-they propose solutions. They look closely at business practices, public policy, and technology design, and ask, "Should this continue? Is there a better approach?" They take seriously the dictum of Thomas Edison: "What one creates with his hand, he should control with his head." It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume is a reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day.

Cover Art
Privacy in a Digital, Networked World - Sherali Zeadally (Editor); Mohamad Badra (Editor)
Call Number: TK 5105 .S9 .Z23 2015
ISBN: 9783319084695
Publication Date: 2015-10-23
Contents: Introduction -- Database Privacy -- Privacy and big data -- Privacy in crowdsourced platforms -- Privacy in healthcare -- Privacy in peer-to-peer networks -- Privacy in the cloud -- Privacy in vehicular ad hoc networks -- Privacy law and regulation: technologies, implications, and solutions -- Privacy in mobile devices -- Privacy in biometric systems -- Privacy in social networks -- The right to privacy in the age of digital technology -- How to explore consumers' privacy choices with behavioral economics -- Techniques, taxonomy, and challenges of privacy protection in the smart grid -- Location-based privacy, protection, safety, and security

Cover Art
Cyber Security - Jeremy Swinfen Green
Call Number: HF 5548.37 .G737 .G737
ISBN: 9781472466730
Publication Date: 2015-09-28
Contents: Cyber security and cyber risk -- A holistic approach to cyber security -- The scope of cyber security -- Systems risks -- People and networks -- Cloud computing -- Bring your own device -- Protecting people -- Keeping data secure outside the office -- Social media risk -- Who is stealing your organization's identity? -- Disposing of data safely -- The internet of things -- Developing a cyber security strategy -- Picking the right team -- Getting prepared -- Developing a risk register -- Managing the impact of cyber incidents -- Responding to incidents -- Digital governance -- Afterword : looking from the past to the future.

Cover Art
Security Intelligence - Qing Li; Gregory Clark
Call Number: TK 5105 .S9 .L5 2015
ISBN: 9781118896693
Publication Date: 2015-04-13
This guide makes advanced enterprise security practices accessible to all corporate IT staff and shows you how to identify relevant solutions to secure critical infrastructure, construct policies that provide flexibility to the users and ensure productivity, deploy effective defenses against rapidly-evolving web threats, implement solutions that comply with relevant rules and regulations, and build new security solutions, policies, and products within the enterprise context.

Cover Art
Digination: Identity, Organization, and Public Life in the Age of Small Digital Devices and Big Digital Domains - Robert C. MacDougall
Call Number: HM 851 .M33
ISBN: 9781611476996
Publication Date: 2014-06-13
The shift from orality to literacy that began with the invention of the phonetic alphabet, and which went into high-gear with Gutenberg's printing press more than 500 years ago, helped make the modern world. Some commentators have argued that this shift from orality to literacy marked a much broader, cultural shift of cataclysmic proportions. Today, with everything from e-mail to blogs, iPods and podcasts, through Google, Yahoo, eBay, and with cutting-edge smart phones, we find ourselves developing relationships with these newest communication tools that aren't simply allowing us to communicate faster, farther and with more ease than ever before. We aren't just moving around ideas, data, and information at unimaginable speed and scale.

Cover Art
Compromised Data - Greg Elmer (Editor); Ganaele Langlois (Editor); Joanna Redden (Editor)
Call Number: QA 76.9 .D343 .C4785 2015
ISBN: 9781501306501
Publication Date: 2015-07-30
Social media promises a new age of digital enlightenment, but social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. The expert, international contributors to Compromised Data explore the limits and challenges of social data research to invent and develop new modes of doing public research. At is core, this collection argues that we are witnessing a fundamental reshaping of the social through social data mining.

Cover Art
Rethinking the Internet of Things - Francis daCosta
Call Number: TK5105.875.I57 D33 2013
ISBN: 9781430257400
Publication Date: 2013-12-30
The book discusses the difference between the "normal" Internet and the Internet of Things, describes a new architecture and its components in the "chirp" context, explains the shortcomings of IP for the Internet of Things, describes the anatomy of the Internet of Things, and describes how to build a suitable network to maximize the amazing potential of the Internet of Things.

Cover Art
Being Digital Citizens - Engin Isin; Evelyn Ruppert
Call Number: JF 1525 .A8 .I68 2015
ISBN: 9781783480555
Publication Date: 2015-04-14
The book examines how citizens encounter and perform new sorts of rights, duties, opportunities and challenges through the Internet. By disrupting prevailing understandings of citizenship and cyberspace, the authors highlight the dynamic relationship between these two concepts. Rather than assuming that these are static or established facts of politics and society, this book shows how the challenges and opportunities presented by the Internet inevitably impact the action and understanding of political agency. It investigates how we conduct ourselves in cyberspace through digital acts. This book provides a new theoretical understanding of what it means to be a citizen today for students and scholars across the social sciences.

Cover Art
Surveillance in America - Ivan Greenberg
ISBN: 9780739172476
Publication Date: 2012-05-31

Cover Art
System Forensics, Investigation, and Response - kim; K. Rudolph; John R. Vacca
Call Number: HV 8079 .C65 .E37 2014-
ISBN: 9780763791346
Publication Date: 2010-09-22

Cover Art
Web of Deceit - Anne P. Mintz (Editor); Amber Benham (Contribution by); Eli Edwards (Contribution by); Ben Fractenberg (Contribution by); Laura Gordon-Murnane (Contribution by); Deborah A. Liptak (Contribution by); Meg Smith (Contribution by); Craig Thompson (Contributio
Call Number: HV 6773 .W423 2012
ISBN: 9780910965910
Publication Date: 2012-02-01
Skilled researchers, journalists, and subject experts have come together in this follow-up to Web of Deception to reveal important lessons for staying safe and retaining privacy_online. In the wake of the social media popularity boom-epitomized by MySpace, eBay, and Craigslist and accelerating with Facebook and Twitter-the success of internet con artists and thieves has been quick to follow. Manipulators have been provided with the tools and targets to perpetrate hoaxes and con games on an ever larger scale._An invaluable guide to safe internet usage, this resource explains the importance of guarding privacy and identity online, spotting misinformation, avoiding_charity scams, and evaluating websites.

Cover Art
Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It. - Jesse Varsalone & Matthew McFadden
Call Number: TK 5105.59 .V38 2012
ISBN: 9781439821190
Publication Date: 2012
TLhe book provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, the book shows you how to outwit computer predators at their own game.

Cover Art
In the plex: How Google thinks, works, and shapes our lives. - Levy, S.
Call Number: HD9696.8.U64 G6657 2011
ISBN: 9781416596585
Written with full cooperation from top management at Google, this is the story behind the most successful and admired technology company of our time.

Cover Art
Filter bubble: What Internet is hiding from you. - Pariser, E.
Call Number: ZA4237 .P37 2011
ISBN: 9781594203008
The hidden rise of personalization on the Internet is controlling--and limiting--the information we consume. In 2009, Google began customizing its search results. Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, this change is symptomatic of the most significant shift to take place on the Web in recent years--the rise of personalization. Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Data companies track your personal information to sell to advertisers, from your political leanings to the hiking boots you just browsed on Zappos. In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs--and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.--From publisher description.

Cover Art
Overload! How Too Much Information is Hazardous to Your Organization. - Spira, Jonathan B.
Call Number: HD 30.2 .S686 2011
ISBN: 9780470879603
"This groundbreaking book reveals how different kinds of information overload impacts workers and businesses as a whole. It helps businesses get a grip on the financial costs of e-mail overload and interruptions and how working in an information overloaded environment impacts employee production, efficiency, and moral. The book then shows how to fight information overload, including some interesting cases is what companies like IBM, Morgan Stanley, and Intel are doing about it. Chapter contents follow: Chapter 1 Infromation Revolutions from Papyrus to e-Readers, Chapter 2 The Shift Occurs: The Construction of an Information Society, Chapter 3 Where Information Comes From, Chapter 4 What We do with Information, Chapter 5 What Too much Information is Doing, Chapter 6 Fighting Back, Chapter 7 Managing Information and Maintaining Sanity, Chapter 8 Enterprise of the Future: The All-Informed Organization. Author also wants to provide interactive content through a URL where readers can quiz themselves on their information overload quotient"--

Cover Art
Histories of Computing - Michael Sean Mahoney
Call Number: QA 76.17 .M34 2011
ISBN: 9780674055681
Publication Date: 2011
Thirteen of Mahoney's essays and papers covering historiography, software engineering, and theoretical computer science.

Economic Security: Neglected dimension of national security? - Ronis, S. R. (Ed.).
Call Number: HC 110 .D4 .E452 2011
ISBN: 0378H14
Publication Date: 2011
Contents: Economic security : neglected dimension of national security? / David M. Walker -- Toward a premise for grand strategy / John F. Morton -- Energy security is national security / Keith W. Cooley -- Achieving energy security that feeds the economic component of national security / Louis J. Infante -- A well-educated workforce : vital component of national and economic security / Myra Howze Shiplett ... [et al.] -- Innovation / Carmen Medina -- Conclusion / Sheila R. Ronis.

On August 24-25, 2010, the National Defense University held a conference titled Economic Security: Neglected Dimension of National Security? Selected papers from the conference, edited by Sheila R. Ronis, comprise this volume.
Includes bibliographical references.

E-Books

Here are some of the subject terms you can use to find e-books in the EBSCO's E-Book Collection database:
computer crime
computer hackers
computer security
computer networks--security measures
contingency planning
crisis management
cryptography
cyberterrorism
data encryption
data protection
data recovery
disaster relief
electronic commerce--security measures
Internet--security measures
privacy--right of

Type the code SU and then one of the terms shown above; for example: SU computer security.

 

Google Books

Be aware that Google provides excerpts from books, not the entire contents of  books.



Description

Loading  Loading...

Tip