Information Technology

Per Page:
Sort:

Protocols for Secure Electronic Commerce, Third Edition

Mostafa Hashem Sherif
May 25, 2016

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:...

Circuits and Systems for Security and Privacy

Farhana Sheikh, Leonel Sousa
May 24, 2016

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of...

Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

David R. Matthews
May 24, 2016

Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or...

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
May 13, 2016

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with...

Enterprise Level Security: Securing Information Systems in an Uncertain World

William R. Simpson
May 13, 2016

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized,...

Handbook of SCADA/Control Systems Security, Second Edition

Robert Radvanovsky, Jacob Brodsky
May 10, 2016

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects...

Information Security Policies, Procedures, and Standards: A Practitioner's Reference

Douglas J. Landoll
May 05, 2016

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the...

Big Data: Storage, Sharing, and Security

Fei Hu
May 03, 2016

Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and ignore the internal implementation details—making them unsuitable to R&D people. To fill such a need, Big Data: Storage, Sharing, and Security examines Big Data management...

E-Systems for the 21st Century: Concept, Developments, and Applications - Two Volume Set

Seifedine Kadry, Abdelkhalak El Hami
May 03, 2016

E-based systems and computer networks are becoming standard practice across all sectors, including health, engineering, business, education, security, and citizen interaction with local and national government. They facilitate rapid and easy dissemination of information and data to assist service...

Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing

Ann Butera
May 02, 2016

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing...

From Action Systems to Distributed Systems: The Refinement Approach

Luigia Petre, Emil Sekerinski
April 27, 2016

Formal methods traditionally address the question of transforming software engineering into a mature engineering discipline. This essentially refers to trusting that the software-intensive systems that form our society’s infrastructures are behaving according to their specifications. More recently,...

Software Quality Assurance: Integrating Testing, Security, and Audit

Abu Sayed Mahfuz
April 27, 2016

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and...

Conferences

Year: