Information Technology

Security & Auditing

Per Page:
Sort:

The IoT Architect's Guide to Attainable Security and Privacy

1st Edition

Featured

Damilare D. Fagbemi, David M Wheeler, JC Wheeler
October 4, 2019

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usab...

Botnets: Architectures, Countermeasures, and Challenges

1st Edition

Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
October 08, 2019

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters...

The IoT Architect's Guide to Attainable Security and Privacy

1st Edition

Damilare D. Fagbemi, David M Wheeler, JC Wheeler
October 04, 2019

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of...

Wireless Crime and Forensic Investigation

1st Edition

Gregory Kipper
September 19, 2019

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems,...

Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques

1st Edition

Francesco Bonchi, Elena Ferrari
September 05, 2019

Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and...

The Audit Value Factor

1st Edition

Daniel Samson
August 14, 2019

The Audit Value Factor: Making Management’s Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization. The book explores how to identify, quantify, and articulate value for customers. It details six critical success factors: Value...

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

1st Edition

Robert H. Sloan, Richard Warner
July 15, 2019

The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three...

Inside the Dark Web

1st Edition

Erdal Ozkaya, Rafiqul Islam
July 03, 2019

Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime...

Fundamentals of Internet of Things for Non-Engineers

1st Edition

Rebecca Lee Hammons, Ronald J. Kovac
June 25, 2019

The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers, progressed to connecting people to people, and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare, excitement, and cheering. We’re now...

Vulnerability Management

2nd Edition

Park Foreman
June 25, 2019

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek...

Software Deployment, Updating, and Patching

1st Edition

Bill Stackpole, Patrick Hanrion
June 12, 2019

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training...

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition

2nd Edition

Jason Sachowski
June 05, 2019

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically...

Emerging Security Algorithms and Techniques

1st Edition

Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh
June 04, 2019

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion)...

Conferences

Year: