Information Technology

Security & Auditing

Per Page:
Sort:

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues

Francesco Flammini, Roberto Setola, Giorgio Franceschetti
November 16, 2016

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current...

The State of the Art in Intrusion Prevention and Detection

Al-Sakib Khan Pathan
November 16, 2016

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Sajay Rai, Philip Chukwuma, Richard Cozart
November 10, 2016

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...

Operational Auditing: Principles and Techniques for a Changing World

Hernan Murdock
October 26, 2016

Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance risks at the expense of operational, strategic and technological ones. This limits their ability to evaluate critical risks and processes. This book merges traditional...

Case Studies in Intelligent Computing: Achievements and Trends

Biju Issac, Nauman Israr
October 26, 2016

Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date...

Location Privacy in Wireless Sensor Networks

Ruben Rios, Javier Lopez, Jorge Cuellar
October 21, 2016

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor...

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
October 19, 2016

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human...

Case Studies in Secure Computing: Achievements and Trends

Biju Issac, Nauman Israr
October 19, 2016

In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the...

CBAP® Certification and BABOK® Study Guide

Hans Jonasson
September 20, 2016

The book covers all knowledge areas from the BABOK®, Third Edition, and is designed to be a study guide for the CBAP® certification from IIBA™. It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA® certification. This book is a complete business analysis handbook...

Security in the Private Cloud

John R. Vacca
September 01, 2016

This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to...

Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program

Sean Lyons
September 01, 2016

This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s...

Introduction to Certificateless Cryptography

Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
August 23, 2016

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications...

Conferences

Year: