Information Technology

Security & Auditing

Per Page:
Sort:

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Sajay Rai, Philip Chukwuma, Richard Cozart
November 10, 2016

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...

Operational Auditing: Principles and Techniques for a Changing World

Hernan Murdock
October 26, 2016

Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance risks at the expense of operational, strategic and technological ones. This limits their ability to evaluate critical risks and processes. This book merges traditional...

Case Studies in Intelligent Computing: Achievements and Trends

Biju Issac, Nauman Israr
October 26, 2016

Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date...

Location Privacy in Wireless Sensor Networks

Ruben Rios, Javier Lopez, Jorge Cuellar
October 21, 2016

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor...

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
October 19, 2016

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human...

Case Studies in Secure Computing: Achievements and Trends

Biju Issac, Nauman Israr
October 19, 2016

In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the...

CBAP® Certification and BABOK® Study Guide

Hans Jonasson
September 20, 2016

The book covers all knowledge areas from the BABOK®, Third Edition, and is designed to be a study guide for the CBAP® certification from IIBA™. It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA® certification. This book is a complete business analysis handbook...

Cloud Computing Security: Foundations and Challenges

John R. Vacca
September 09, 2016

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in...

Security in the Private Cloud

John R. Vacca
September 01, 2016

This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to...

Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program

Sean Lyons
September 01, 2016

This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s...

Introduction to Certificateless Cryptography

Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
August 23, 2016

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications...

Network and Data Security for Non-Engineers

Frank M. Groom, Kevin Groom, Stephan S. Jones
August 22, 2016

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful...

Conferences

Year: