Information Technology

Security & Auditing

Per Page:
Sort:

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

1st Edition

R.R. Brooks
November 29, 2004

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming...

The HIPAA Program Reference Handbook

1st Edition

Ross A. Leo
November 29, 2004

Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them...

Network Security Technologies

1st Edition

Kwok T. Fung
October 28, 2004

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy,...

A Practical Guide to Security Assessments

1st Edition

Sudhanshu Kairab
September 29, 2004

The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this with a slowdown in IT spending...

The Ethical Hack: A Framework for Business Value Penetration Testing

1st Edition

James S. Tiller
September 29, 2004

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical...

Assessing and Managing Security Risk in IT Systems: A Structured Methodology

1st Edition

John McCumber
August 12, 2004

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly...

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition

2nd Edition

Thomas R. Peltier
June 11, 2004

Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security...

Public Key Infrastructure: Building Trusted Applications and Web Services

1st Edition

John R. Vacca
May 11, 2004

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years,...

Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

1st Edition

Mauro Barni, Franco Bartolini
February 03, 2004

The rapid growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. This book presents the fundamental principles of watermarking system design and discusses...

Surviving Security: How to Integrate People, Process, and Technology

2nd Edition

Amanda Andress
December 18, 2003

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by...

Protocols for Secure Electronic Commerce

2nd Edition

Mostafa Hashem Sherif
November 24, 2003

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this...

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

1st Edition

Susan Young, Dave Aitel
November 24, 2003

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/...

Conferences

Year: