Information Technology

Security & Auditing

Per Page:
Sort:

Intrusion Detection and Prevention for Mobile Ecosystems

1st Edition

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 6, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

1st Edition

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

Digital Image Watermarking: Theoretical and Computational Advances

1st Edition

Surekha Borra, Rohit Thanki, Nilanjan Dey
December 11, 2018

While there are many spatial/frequency domain watermarking techniques, optimization is a commonly encountered mathematical problem in data security related issues. The research on new embedding domains, hardware implementations and bio-inspired algorithms for optimization problems is on rise as...

The Insider Threat: Assessment and Mitigation of Risks

1st Edition

Eleanor E. Thompson
December 10, 2018

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This...

Cryptographic and Information Security Approaches for Images and Videos

1st Edition

S. Ramakrishnan
December 06, 2018

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application...

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

1st Edition

Todd Fitzgerald
December 03, 2018

Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2...

How to Build a Cyber-Resilient Organization

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
December 03, 2018

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of...

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of...

Integrating a Usable Security Protocol into User Authentication Services Design Process

1st Edition

Christina Braz, Ahmed Seffah, Bilal Naqvi
November 21, 2018

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is...

iOS App Penetration Testing and Security

1st Edition

Swaroop Yermalkar
October 31, 2018

...

Information Security Governance: Framework and Toolset for CISOs and Decision Makers

1st Edition

Andrej Volchkov
October 25, 2018

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc....

Human-Computer Interaction and Cybersecurity Handbook

1st Edition

Abbas Moallem
October 24, 2018

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018 Cyber security, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that...

The CIO’s Guide to Information Security Incident Management

1st Edition

Matthew William Arthur Pemble, Wendy Fiona Goucher
October 22, 2018

This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan...

Analysis and Design of Networked Control Systems under Attacks

1st Edition

Yuan Yuan, Hongjiu Yang, Lei Guo, Fuchun Sun
October 10, 2018

This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive...

Conferences

Year: