Information Technology

Security & Auditing

Per Page:
Sort:

Multilevel Security for Relational Databases

1st Edition

Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, Hala S. El-Sayed
September 18, 2018

Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support...

Network Attacks and Defenses: A Hands-on Approach

1st Edition

Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
September 18, 2018

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with...

Managing Trust in Cyberspace

1st Edition

Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
September 18, 2018

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

Security and Privacy in Smart Grids

1st Edition

Yang Xiao
September 18, 2018

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and...

Developing and Securing the Cloud

1st Edition

Bhavani Thuraisingham
September 18, 2018

Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.Filling this void, Developing and Securing the Cloud...

Advances of DNA Computing in Cryptography

1st Edition

Suyel Namasudra, Ganesh Chandra Deka
September 10, 2018

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical...

Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

1st Edition

Chong Ee
August 22, 2018

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise...

Internet of Things Security: Challenges, Advances, and Analytics

1st Edition

Chintan Patel, Nishant Doshi
August 22, 2018

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best...

Information Technology Control and Audit, Fifth Edition

5th Edition

Angel R. Otero
August 08, 2018

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also...

Handbook of e-Business Security

1st Edition

João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
July 19, 2018

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and...

Security without Obscurity: A Guide to Cryptographic Architectures

1st Edition

Jeff Stapleton
July 17, 2018

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are...

The Science of Biometrics: Security Technology for Identity Verification

1st Edition

Ravindra Das
July 10, 2018

The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins...

Conferences

Year: