Information Technology

Security & Auditing

Per Page:
Sort:

Intrusion Detection and Prevention for Mobile Ecosystems

1st Edition

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 6, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

1st Edition

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

Analysis and Design of Networked Control Systems under Attacks

1st Edition

Yuan Yuan, Hongjiu Yang, Lei Guo, Fuchun Sun
October 10, 2018

This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive...

Auditor Essentials: 100 Concepts, Tips, Tools, and Techniques for Success

1st Edition

Hernan Murdock
October 09, 2018

Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession. This easy to use reference makes this process easier and ensures auditors can obtain needed information quickly and...

Advances of DNA Computing in Cryptography

1st Edition

Suyel Namasudra, Ganesh Chandra Deka
September 10, 2018

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical...

Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

1st Edition

Chong Ee
August 22, 2018

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise...

Internet of Things Security: Challenges, Advances, and Analytics

1st Edition

Chintan Patel, Nishant Doshi
August 22, 2018

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best...

Information Technology Control and Audit, Fifth Edition

5th Edition

Angel R. Otero
August 08, 2018

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also...

Handbook of e-Business Security

1st Edition

João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
July 19, 2018

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and...

Security without Obscurity: A Guide to Cryptographic Architectures

1st Edition

Jeff Stapleton
July 17, 2018

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are...

The Science of Biometrics: Security Technology for Identity Verification

1st Edition

Ravindra Das
July 10, 2018

The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins...

Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard

1st Edition

Heru Susanto, Mohammad Nabil Almunawar
June 19, 2018

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness...

Valuing Data: An Open Framework

1st Edition

Dewey E. Ray
June 18, 2018

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple...

Handbook of Image-based Security Techniques

1st Edition

Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
May 22, 2018

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking...

Conferences

Year: