Information Technology

Security & Auditing

Per Page:
Sort:

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI

1st Edition

Debra S. Herrmann
January 22, 2007

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization’s mission, industry, and size will...

Complete Guide to CISM Certification

1st Edition

Thomas R. Peltier, Justin Peltier
December 13, 2006

The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management...

IT Security Governance Guidebook with Security Program Metrics on CD-ROM

1st Edition

Fred Cohen
November 14, 2006

The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in...

Practical Hacking Techniques and Countermeasures

1st Edition

Mark D. Spivey
November 02, 2006

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along...

Security in Sensor Networks

1st Edition

Yang Xiao
August 15, 2006

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference...

Information Security: Design, Implementation, Measurement, and Compliance

1st Edition

Timothy P. Layton
July 20, 2006

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to...

Audit and Trace Log Management: Consolidation and Analysis

1st Edition

Phillip Q. Maier
April 05, 2006

As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and Analysis offers a comprehensive introduction and explanation of requirements and problem definition,...

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

2nd Edition

Jan Killmeyer
January 13, 2006

Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and...

Enterprise Security Architecture: A Business-Driven Approach

1st Edition

Nicholas A Sherwood
November 15, 2005

Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a framework for developing and...

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

1st Edition

Susan Hansche
September 29, 2005

The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains:...

The CISO Handbook: A Practical Guide to Securing Your Company

1st Edition

Michael Gentile, Ron Collette, Thomas D. August
August 24, 2005

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a...

Database and Applications Security: Integrating Information Security and Data Management

1st Edition

Bhavani Thuraisingham
May 26, 2005

This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and...

Conferences

Year: