Information Technology

Security & Auditing

Per Page:
Sort:

The Insider Threat: Assessment and Mitigation of Risks

1st Edition

Eleanor E. Thompson
December 10, 2018

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This...

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

1st Edition

Todd Fitzgerald
December 03, 2018

Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2...

How to Build a Cyber-Resilient Organization

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
December 03, 2018

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of...

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of...

Integrating a Usable Security Protocol into User Authentication Services Design Process

1st Edition

Christina Braz, Ahmed Seffah, Bilal Naqvi
November 21, 2018

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is...

Information Security Governance: Framework and Toolset for CISOs and Decision Makers

1st Edition

Andrej Volchkov
October 25, 2018

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc....

Human-Computer Interaction and Cybersecurity Handbook

1st Edition

Abbas Moallem
October 24, 2018

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018 Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The...

The CIO’s Guide to Information Security Incident Management

1st Edition

Matthew William Arthur Pemble, Wendy Fiona Goucher
October 22, 2018

This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan...

Analysis and Design of Networked Control Systems under Attacks

1st Edition

Yuan Yuan, Hongjiu Yang, Lei Guo, Fuchun Sun
October 10, 2018

This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive...

Auditor Essentials: 100 Concepts, Tips, Tools, and Techniques for Success

1st Edition

Hernan Murdock
October 09, 2018

Internal auditors must know many concepts, techniques, control frameworks, and remain knowledgeable despite the many changes occurring in the marketplace and their profession. This easy to use reference makes this process easier and ensures auditors can obtain needed information quickly and...

Practical Risk Management for the CIO

1st Edition

Mark Scherling
September 27, 2018

The growing complexity of today’s interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run...

Conducting Network Penetration and Espionage in a Global Environment

1st Edition

Bruce Middleton
September 18, 2018

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

Conferences

Year: