MARC details
000 -LEADER |
fixed length control field |
02355nam a22002657a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250213150822.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250213b ph ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783030039363 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
Z 5643.C65 .K59 2019 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kizza, Joseph Migga |
Relator term |
author |
245 ## - TITLE STATEMENT |
Title |
Ethical and secure computing : |
Remainder of title |
a concise module / |
Statement of responsibility, etc. |
Joseph Migga Kizza |
250 ## - EDITION STATEMENT |
Edition statement |
Second Edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Switzerland : |
Name of publisher, distributor, etc. |
Springer, |
Date of publication, distribution, etc. |
c2019. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 285 pages ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
USD35.00 |
490 ## - SERIES STATEMENT |
Series statement |
Undergraduate Topics in Computer Science |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Morality and the Law -- Ethics and Ethical Analysis -- Ethics and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- Cyberbullying -- Artificial Intelligence, Virtualization, and Cyberspace -- Ethical, Privacy, and Security Issues in Social Network Ecosystems -- Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies.<br/><br/>Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computingas the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
APPLICATION SOFTWARE |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |
Suppress in OPAC |
No |