Information Technology

Security & Auditing

Per Page:

Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

Mauro Barni, Franco Bartolini
February 03, 2004

The rapid growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the fundamental principles of watermarking system design and discusses...

Surviving Security: How to Integrate People, Process, and Technology

Amanda Andress
December 18, 2003

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by...

Protocols for Secure Electronic Commerce, Second Edition

Mostafa Hashem Sherif
November 24, 2003

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this...

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

Susan Young, Dave Aitel
November 24, 2003

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/...

Strategic Information Security

John Wylder
November 24, 2003

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information...

The ABCs of LDAP: How to Install, Run, and Administer LDAP Services

Reinhard E. Voglmaier
November 13, 2003

Until now, it has been difficult to find the right source of information on LDAP and directory server implementations: books on the subject are overly product-specific, and a search on the Web results in information overload. The ABCs of LDAP: How to Install, Run, and Administer LDAP Services...

Investigator's Guide to Steganography

Gregory Kipper
October 27, 2003

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in...

Network Perimeter Security: Building Defense In-Depth

Cliff Riggs
October 27, 2003

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are...

Cyber Terrorism: A Guide for Facility Managers

Joseph F. Gustin
October 15, 2003

Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and the constant attacks from viruses, hackers, and other invasive programs. Known terrorist groups are identified, discussed, and their...

Critical Incident Management

Alan B. Sterneckert
September 29, 2003

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they have taken to secure people, information and infrastructure from outside attacks are inefficient or incomplete. Responding to...

The Laws of Software Process: A New Model for the Production and Management of Software

Phillip G. Armour
September 25, 2003

Within one generation, software has become one of the principal sources of wealth in the world. The development and use of software has grown faster than for any artifact in the history of the world. Probably no topic or subject in history has accelerated in its rate of practice as software has....

Managing A Network Vulnerability Assessment

Thomas R. Peltier, Justin Peltier, John A. Blackley
May 28, 2003

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and...