Information Technology

Security & Auditing

Per Page:
Sort:

The Complete Guide to Cybersecurity Risks and Controls

Anne Kohnke, Dan Shoemaker, Ken E. Sigler
April 04, 2016

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day...

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

Fei Hu
April 01, 2016

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts...

Operational Assessment of IT

Steve Katzman
April 01, 2016

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization’s business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks,...

Security without Obscurity: A Guide to PKI Operations

Jeff Stapleton, W. Clay Epstein
February 17, 2016

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions,...

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Dan Shoemaker, Anne Kohnke, Ken Sigler
February 08, 2016

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship...

Securing an IT Organization through Governance, Risk Management, and Audit

Ken E. Sigler, James L. Rainey, III
January 22, 2016

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come...

Encyclopedia of Information Systems and Technology - Two Volume Set

Phillip A. Laplante
December 29, 2015

Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology.The topics covered in this encyclopedia encompass internationally...

The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure

Rocky Termanini
December 21, 2015

Here’s an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously survived smallpox did not contract the disease a second time. In fact, these survivors were often called upon to attend to those afflicted with smallpox. Consider this book...

Honeypots and Routers: Collecting Internet Attacks

Mohssen Mohammed, Habib-ur Rehman
December 01, 2015

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy...

Anti-Spam Techniques Based on Artificial Immune System

Ying Tan
December 01, 2015

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial...

Leading the Internal Audit Function

Lynn Fountain
October 28, 2015

While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to...

Securing Cyber-Physical Systems

Al-Sakib Khan Pathan
October 06, 2015

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a...

Conferences

Year: