Information Technology

Security & Auditing

Per Page:
Sort:

Security in IoT-Enabled Spaces

1st Edition

Fadi Al-Turjman
February 18, 2019

Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart...

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies

1st Edition

Chong Li, Meikang Qiu
February 04, 2019

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different...

Cryptographic and Information Security Approaches for Images and Videos

1st Edition

S. Ramakrishnan
December 26, 2018

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application...

Security for Software Engineers

1st Edition

James N. Helfrich
December 17, 2018

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack...

Digital Image Watermarking: Theoretical and Computational Advances

1st Edition

Surekha Borra, Rohit Thanki, Nilanjan Dey
December 11, 2018

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware...

The Insider Threat: Assessment and Mitigation of Risks

1st Edition

Eleanor E. Thompson
December 10, 2018

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This...

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

1st Edition

Todd Fitzgerald
December 03, 2018

Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2...

How to Build a Cyber-Resilient Organization

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
December 03, 2018

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of...

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of...

Integrating a Usable Security Protocol into User Authentication Services Design Process

1st Edition

Christina Braz, Ahmed Seffah, Bilal Naqvi
November 21, 2018

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is...

Information Security Governance: Framework and Toolset for CISOs and Decision Makers

1st Edition

Andrej Volchkov
October 25, 2018

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc....

Human-Computer Interaction and Cybersecurity Handbook

1st Edition

Abbas Moallem
October 24, 2018

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018 Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that...

Conferences

Year: