Information Technology

Security & Auditing

Per Page:

Statistical Methods in Computer Security

1st Edition

William W.S. Chen
December 28, 2004

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security...

Multimedia Security Handbook

1st Edition

Borko Furht, Darko Kirovski
December 28, 2004

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content....

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

1st Edition

R.R. Brooks
November 29, 2004

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming...

The HIPAA Program Reference Handbook

1st Edition

Ross A. Leo
November 29, 2004

Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them...

Network Security Technologies

1st Edition

Kwok T. Fung
October 28, 2004

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy,...

Assessing and Managing Security Risk in IT Systems: A Structured Methodology

1st Edition

John McCumber
August 12, 2004

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly...

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition

2nd Edition

Thomas R. Peltier
June 11, 2004

Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security...

Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

1st Edition

Mauro Barni, Franco Bartolini
February 03, 2004

The rapid growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the fundamental principles of watermarking system design and discusses...

Protocols for Secure Electronic Commerce

2nd Edition

Mostafa Hashem Sherif
November 24, 2003

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this...

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

1st Edition

Susan Young, Dave Aitel
November 24, 2003

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/...

The ABCs of LDAP: How to Install, Run, and Administer LDAP Services

1st Edition

Reinhard E. Voglmaier
November 13, 2003

This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of arguments treated in the various books that are available, and provides many examples of LDAP code....

Investigator's Guide to Steganography

1st Edition

Gregory Kipper
October 27, 2003

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in...