Information Technology

Security & Auditing

Per Page:
Sort:

Assessing and Managing Security Risk in IT Systems: A Structured Methodology

John McCumber
August 12, 2004

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly...

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition

Thomas R. Peltier
June 11, 2004

Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security...

Public Key Infrastructure: Building Trusted Applications and Web Services

John R. Vacca
May 11, 2004

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years,...

Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

Mauro Barni, Franco Bartolini
February 03, 2004

The rapid growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the fundamental principles of watermarking system design and discusses...

Surviving Security: How to Integrate People, Process, and Technology

Amanda Andress
December 18, 2003

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by...

Protocols for Secure Electronic Commerce, Second Edition

Mostafa Hashem Sherif
November 24, 2003

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this...

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

Susan Young, Dave Aitel
November 24, 2003

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/...

Strategic Information Security

John Wylder
November 24, 2003

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information...

The ABCs of LDAP: How to Install, Run, and Administer LDAP Services

Reinhard E. Voglmaier
November 13, 2003

Until now, it has been difficult to find the right source of information on LDAP and directory server implementations: books on the subject are overly product-specific, and a search on the Web results in information overload. The ABCs of LDAP: How to Install, Run, and Administer LDAP Services...

Investigator's Guide to Steganography

Gregory Kipper
October 27, 2003

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in...

Network Perimeter Security: Building Defense In-Depth

Cliff Riggs
October 27, 2003

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are...

Cyber Terrorism: A Guide for Facility Managers

Joseph F. Gustin
October 15, 2003

Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and the constant attacks from viruses, hackers, and other invasive programs. Known terrorist groups are identified, discussed, and their...

Conferences

Year: