Ethical and secure computing : (Record no. 1894)

MARC details
000 -LEADER
fixed length control field 02355nam a22002657a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250213150822.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250213b ph ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030039363
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number Z 5643.C65 .K59 2019
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Kizza, Joseph Migga
Relator term author
245 ## - TITLE STATEMENT
Title Ethical and secure computing :
Remainder of title a concise module /
Statement of responsibility, etc. Joseph Migga Kizza
250 ## - EDITION STATEMENT
Edition statement Second Edition
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Switzerland :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. c2019.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 285 pages ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD35.00
490 ## - SERIES STATEMENT
Series statement Undergraduate Topics in Computer Science
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Morality and the Law -- Ethics and Ethical Analysis -- Ethics and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- Cyberbullying -- Artificial Intelligence, Virtualization, and Cyberspace -- Ethical, Privacy, and Security Issues in Social Network Ecosystems -- Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies.
520 ## - SUMMARY, ETC.
Summary, etc. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies.<br/><br/>Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computingas the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element APPLICATION SOFTWARE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Koha item type
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 01/11/2025 Purchased - Amazon 35.00   GC Z 5643.C65 .K59 2019 NULIB000020477 02/13/2025 c.1 Books