Information Technology

Security & Auditing

Per Page:
Sort:

Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing

Ann Butera
May 02, 2016

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing...

Software Quality Assurance: Integrating Testing, Security, and Audit

Abu Sayed Mahfuz
April 27, 2016

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and...

Analyzing and Securing Social Networks

Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, Latifur Khan
April 05, 2016

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of...

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop

Peng Cheng, Heng Zhang, Jiming Chen
April 05, 2016

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of...

The Complete Guide to Cybersecurity Risks and Controls

Anne Kohnke, Dan Shoemaker, Ken E. Sigler
April 04, 2016

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day...

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

Fei Hu
April 01, 2016

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts...

Operational Assessment of IT

Steve Katzman
April 01, 2016

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization’s business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks,...

Security without Obscurity: A Guide to PKI Operations

Jeff Stapleton, W. Clay Epstein
February 17, 2016

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions,...

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Dan Shoemaker, Anne Kohnke, Ken Sigler
February 08, 2016

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship...

Securing an IT Organization through Governance, Risk Management, and Audit

Ken E. Sigler, James L. Rainey, III
January 22, 2016

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come...

Encyclopedia of Information Systems and Technology - Two Volume Set

Phillip A. Laplante
December 29, 2015

Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology.The topics covered in this encyclopedia encompass internationally...

The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure

Rocky Termanini
December 21, 2015

Here’s an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously survived smallpox did not contract the disease a second time. In fact, these survivors were often called upon to attend to those afflicted with smallpox. Consider this book...

Conferences

Year: