Information Technology

Security & Auditing

Per Page:
Sort:

Data Analytics for Internal Auditors

Richard E. Cascarino
March 15, 2017

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 09, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Cybersecurity: Geopolitics, Law, and Policy

Amos N. Guiora
March 07, 2017

This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement...

Walling Out the Insiders: Controlling Access to Improve Organizational Security

Michael Erbschloe
February 23, 2017

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security...

Ethics and the Internal Auditor's Political Dilemma: Tools and Techniques to Evaluate a Company's Ethical Culture

Lynn Fountain
December 16, 2016

This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA...

Biometrics in a Data Driven World: Trends, Technologies, and Challenges

Sinjini Mitra, Mikhail Gofman
December 15, 2016

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of...

Real-World Electronic Voting: Design, Analysis and Deployment

Feng Hao, Peter Y. A. Ryan
December 13, 2016

Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting. This book explores...

The Data Protection Officer: Profession, Rules, and Role

Paul Lambert
December 13, 2016

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and...

Guide to Pairing-Based Cryptography

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...

Security for Wireless Sensor Networks using Identity-Based Cryptography

Harsh Kupwade Patil, Stephen A. Szygenda
December 01, 2016

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack...

Conferences

Year: