Information Technology

Security & Auditing

Per Page:
Sort:

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

2nd Edition

Jan Killmeyer
January 13, 2006

Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and...

Enhancing Computer Security with Smart Technology

1st Edition

V. Rao Vemuri
November 21, 2005

Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects...

Enterprise Security Architecture: A Business-Driven Approach

1st Edition

Nicholas A Sherwood
November 15, 2005

Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a framework for developing and...

Guide to Optimal Operational Risk and BASEL II

1st Edition

Ioannis S. Akkizidis, Vivianne Bouchereau
November 01, 2005

Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements. This volume provides detailed guidance for the design and implementation of an efficient operational risk management system. It contains all...

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

1st Edition

Susan Hansche
September 29, 2005

The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains:...

The CISO Handbook: A Practical Guide to Securing Your Company

1st Edition

Michael Gentile, Ron Collette, Thomas D. August
August 24, 2005

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a...

Intelligence Support Systems: Technologies for Lawful Intercepts

1st Edition

Paul Hoffmann, Kornel Terplan
July 27, 2005

Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they...

Database and Applications Security: Integrating Information Security and Data Management

1st Edition

Bhavani Thuraisingham
May 26, 2005

This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and...

Curing the Patch Management Headache

1st Edition

Felicia M. Wetter
February 18, 2005

A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network...

Cyber Crime Investigator's Field Guide

2nd Edition

Bruce Middleton
January 25, 2005

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there...

Statistical Methods in Computer Security

1st Edition

William W.S. Chen
December 28, 2004

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security...

Multimedia Security Handbook

1st Edition

Borko Furht, Darko Kirovski
December 28, 2004

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content....

Conferences

Year: