CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives
Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Ron Collette, Michael Gentile, Skye Gentile
November 21, 2008
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure...
November 18, 2008
Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or...
August 27, 2008
Critical Infrastructure (CI) is fundamental to the functioning of a modern economy, and consequently, maintaining CI security is paramount. However, despite all the security technology available for threats and risks to CI, this crucial area often generates more fear than rational discussion....
Marlin B. Pohlman
April 09, 2008
In today’s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner...
Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati
December 22, 2007
While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According...
Albert Marcella, Jr., Doug Menendez
December 19, 2007
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of...
June 18, 2007
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication...
Harold F. Tipton, Micki Krause
May 14, 2007
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4...
April 17, 2007
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing...
Nicolas Sklavos, Xinmiao Zhang
March 30, 2007
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless...
March 30, 2007
This book contains product specific information based on Cisco router command line interface, and IBM's Net view. It is designed to help us understand the "parts and pieces" of communications and determine how components fit together, and what they look like on your bill....
Debra S. Herrmann
January 22, 2007
While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization’s mission, industry, and size will...
CRC Press exhibits every year at more than 100 professional and academic conferences held across the world. At these events, you will have the chance to meet the authors and to get to know the CRC Press staff. You can also take advantage of special discounts for convention attendees. Visit us at the following conventions throughout the year.