Information Technology

Security & Auditing

Per Page:
Sort:

Wireless Multimedia Communication Systems: Design, Analysis, and Implementation

K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz
March 29, 2017

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih
March 29, 2017

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the...

Data Analytics for Internal Auditors

Richard E. Cascarino
March 15, 2017

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 08, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Cybersecurity: Geopolitics, Law, and Policy

Amos N. Guiora
March 07, 2017

This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement...

Walling Out the Insiders: Controlling Access to Improve Organizational Security

Michael Erbschloe
February 23, 2017

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security...

Biometrics in a Data Driven World: Trends, Technologies, and Challenges

Sinjini Mitra, Mikhail Gofman
December 15, 2016

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of...

Real-World Electronic Voting: Design, Analysis and Deployment

Feng Hao, Peter Y. A. Ryan
December 13, 2016

Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting. This book explores...

Ethics and the Internal Auditor's Political Dilemma: Tools and Techniques to Evaluate a Company's Ethical Culture

Lynn Fountain
December 12, 2016

This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA...

Guide to Pairing-Based Cryptography

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...

Conferences

Year: