Information Technology

Security & Auditing

Per Page:
Sort:

Security in the Private Cloud

John R. Vacca
September 01, 2016

This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to...

Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program

Sean Lyons
September 01, 2016

This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s...

Introduction to Certificateless Cryptography

Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
August 23, 2016

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications...

Network and Data Security for Non-Engineers

Frank M. Groom, Kevin Groom, Stephan S. Jones
August 22, 2016

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful...

Data Privacy: Principles and Practice

Nataraj Venkataramanan, Ashwin Shriram
August 19, 2016

The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and...

Practical Cloud Security: A Cross-Industry View

Melvin B. Greer, Jr., Kevin L. Jackson
August 02, 2016

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of...

Protocols for Secure Electronic Commerce, Third Edition

Mostafa Hashem Sherif
May 25, 2016

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:...

Circuits and Systems for Security and Privacy

Farhana Sheikh, Leonel Sousa
May 24, 2016

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of...

Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

David R. Matthews
May 24, 2016

Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or...

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
May 13, 2016

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with...

Enterprise Level Security: Securing Information Systems in an Uncertain World

William R. Simpson
May 13, 2016

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized,...

Information Security Policies, Procedures, and Standards: A Practitioner's Reference

Douglas J. Landoll
May 05, 2016

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the...

Conferences

Year: