Information Technology

Security & Auditing

Per Page:

CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives

1st Edition

Ron Collette, Michael Gentile, Skye Gentile
November 21, 2008

As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure...

Introduction to Network Security

1st Edition

Douglas Jacobson
November 18, 2008

Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or...

Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies

1st Edition

Tyson Macaulay
August 27, 2008

Critical Infrastructure (CI) is fundamental to the functioning of a modern economy, and consequently, maintaining CI security is paramount. However, despite all the security technology available for threats and risks to CI, this crucial area often generates more fear than rational discussion....

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition

3rd Edition

Marlin B. Pohlman
April 09, 2008

In today’s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner...

Digital Privacy: Theory, Technologies, and Practices

1st Edition

Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati
December 22, 2007

While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition

2nd Edition

Albert Marcella, Jr., Doug Menendez
December 19, 2007

Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of...

Mechanics of User Identification and Authentication: Fundamentals of Identity Management

1st Edition

Dobromir Todorov
June 18, 2007

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication...

Information Security Management Handbook

6th Edition

Harold F. Tipton, Micki Krause
May 14, 2007

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4...

Security in Distributed, Grid, Mobile, and Pervasive Computing

1st Edition

Yang Xiao
April 17, 2007

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing...

Wireless Security and Cryptography: Specifications and Implementations

1st Edition

Nicolas Sklavos, Xinmiao Zhang
March 30, 2007

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless...

Data Communications Network Auditing

1st Edition

Bruce Griffis
March 30, 2007

This book contains product specific information based on Cisco router command line interface, and IBM's Net view. It is designed to help us understand the "parts and pieces" of communications and determine how components fit together, and what they look like on your bill....

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI

1st Edition

Debra S. Herrmann
January 22, 2007

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization’s mission, industry, and size will...