Information Technology

Security & Auditing

Per Page:
Sort:

Multilevel Modeling of Secure Systems in QoP-ML

Bogdan Księżopolski
August 01, 2017

In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and...

iOS App Penetration Testing and Security

Swaroop Yermalkar
July 31, 2017

...

A History of Cyber Security Attacks: 1980 to Present

Bruce Middleton
July 14, 2017

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how...

Threat Level Red: Cybersecurity Research Programs of the U.S. Government

Michael Erbschloe
July 14, 2017

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely...

Vein Pattern Recognition: A Privacy-Enhancing Biometric

Chuck Wilson
June 14, 2017

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR’s growing acceptance and use: it is more accurate than many other biometric methods, it...

Introduction to Contextual Processing: Theory and Applications

Gregory Vert, S. Sitharama Iyengar, Vir V. Phoha
June 14, 2017

Develops a Comprehensive, Global Model for Contextually Based Processing SystemsA new perspective on global information systems operation Helping to advance a valuable paradigm shift in the next generation and processing of knowledge, Introduction to Contextual Processing: Theory and Applications...

Practitioner’s Guide to Business Impact Analysis

Priti Sikdar
June 02, 2017

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists...

Social Media Warfare: Equal Weapons for All

Michael Erbschloe
May 08, 2017

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and...

Wireless Multimedia Communication Systems: Design, Analysis, and Implementation

K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz
March 29, 2017

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih
March 29, 2017

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the...

Data Analytics for Internal Auditors

Richard E. Cascarino
March 15, 2017

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Conferences

Year: