Information Technology

Security & Auditing

Per Page:
Sort:

Secure, Resilient, and Agile Software Development

1st Edition

Mark Merkow
December 09, 2019

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software...

Secrets of a Cyber Security Architect

1st Edition

Brook S. E. Schoenfield
December 05, 2019

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional...

Human Dimensions of Cybersecurity

1st Edition

Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
November 27, 2019

"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D’Alessandro, and Roger Bradbury have produced a book that … shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity — what...

The Biometric Computing: Recognition and Registration

1st Edition

Karm Veer Arya, Robin Singh Bhadoria
November 21, 2019

"The Biometric Computing: Recognition & Registration" presents introduction of biometrics along with detailed analysis for identification and recognition methods. This book forms the required platform for understanding biometric computing and its implementation for securing target system. It...

Botnets: Architectures, Countermeasures, and Challenges

1st Edition

Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
October 08, 2019

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters...

The IoT Architect's Guide to Attainable Security and Privacy

1st Edition

Damilare D. Fagbemi, David M Wheeler, JC Wheeler
October 04, 2019

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of...

Wireless Crime and Forensic Investigation

1st Edition

Gregory Kipper
September 19, 2019

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems,...

Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques

1st Edition

Francesco Bonchi, Elena Ferrari
September 05, 2019

Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and...

The Audit Value Factor

1st Edition

Daniel Samson
August 14, 2019

The Audit Value Factor: Making Management’s Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization. The book explores how to identify, quantify, and articulate value for customers. It details six critical success factors: Value...

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

1st Edition

Robert H. Sloan, Richard Warner
July 15, 2019

The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three...

Inside the Dark Web

1st Edition

Erdal Ozkaya, Rafiqul Islam
July 03, 2019

Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime...

Fundamentals of Internet of Things for Non-Engineers

1st Edition

Rebecca Lee Hammons, Ronald J. Kovac
June 25, 2019

The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers, progressed to connecting people to people, and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare, excitement, and cheering. We’re now...

Conferences

Year: