Security & Auditing

PUBLISHED


Viewing: 1 - 10 of 213
Published:
April 10, 2014
Author(s):
Kun Peng
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for 
Add to cart
$79.95
Hardback
Published:
February 06, 2014
Editor(s):
Nabendu Chaki, Rituparna Chaki
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the 
Add to cart
$99.95
Hardback
Published:
January 29, 2014
Editor(s):
Al-Sakib Khan Pathan
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged 
Add to cart
$119.95
Hardback
Published:
January 17, 2014
Author(s):
David Kahn
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking 
Add to cart
$59.95
Hardback
Published:
December 14, 2013
Editor(s):
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between 
Add to cart
$99.95
Hardback
Published:
December 10, 2013
Author(s):
Carl Roper
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage 
Add to cart
$69.95
Hardback
Published:
December 09, 2013
Author(s):
Frank Siepmann
With cloud computing quickly becoming a standard in today’s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments—requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and 
Add to cart
$69.95
Hardback
Published:
December 09, 2013
Author(s):
James Ransome, Anmol Misra
"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamitis. Carnegie Mellon 
Add to cart
$79.95
Hardback
Published:
December 09, 2013
Editor(s):
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human 
Add to cart
$129.95
Hardback
Published:
December 04, 2013
Author(s):
Michael Land, Truett Ricks, Bobby Ricks
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals 
Add to cart
$89.95
Hardback

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us