Legal, Ethical & Social Aspects of IT Products

  • Internal Audit Practice from A to Z

    By Patrick Onwura Nzechukwu

    This book addresses the practice of internal auditing using GAAS (Generally Accepted Auditing Standards), GAGAS (Generally Accepted Government Auditing Standards) and International Standards for the Professional Practice of Internal Auditing (Standards) as enunciated by the IIA. Unique in that it…

    Hardback – 2016-11-08 
    Auerbach Publications
    Internal Audit and IT Audit

  • Study Guide for TOGAF 9.1 Certifications

    By B. V. Kumar

    This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ‘The TOGAF Foundation Certification’ and ‘The TOGAF Certified Certification’ will find this book useful. The contents of the book…

    Hardback – 2016-10-31 
    Chapman and Hall/CRC

  • Ethics and the Internal Auditor's Political Dilemma

    Tools and Techniques to Evaluate a Company's Ethical Culture

    By Lynn Fountain

    This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA…

    Paperback – 2016-10-28 
    Auerbach Publications
    Internal Audit and IT Audit

  • Operational Auditing

    Principles and Techniques for a Changing World

    By Hernan Murdock

    Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance risks at the expense of operational, strategic and technological ones. This limits their ability to evaluate critical risks and processes. This book merges traditional…

    Hardback – 2016-10-27 
    Auerbach Publications
    Internal Audit and IT Audit

  • Location Privacy in Wireless Sensor Networks

    By Ruben Rios, Javier Lopez, Jorge Cuellar

    Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given its ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor…

    Hardback – 2016-10-10 
    CRC Press
    Series in Security, Privacy and Trust

  • CBAP® Certification and BABOK® Study Guide

    By Hans Jonasson

    The book covers all knowledge areas from the BABOK®, Third Edition, and is designed to be a study guide for the CBAP® certification from IIBA™. It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA® certification. This book is a complete business analysis handbook…

    Hardback – 2016-10-07 
    Auerbach Publications

  • Data Analytics for Internal Auditors

    By Richard E. Cascarino

    There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that…

    Hardback – 2016-10-03 
    Auerbach Publications
    Internal Audit and IT Audit

  • Cloud Computing Security

    Foundations and Challenges

    Edited by John R. Vacca

    This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in…

    Hardback – 2016-09-02 
    CRC Press

  • Security in the Private Cloud

    Edited by John R. Vacca

    This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to…

    Hardback – 2016-08-26 
    CRC Press

  • Corporate Defense and the Value Preservation Imperative

    Bulletproof Your Corporate Defense Program

    By Sean Lyons

    This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s…

    Hardback – 2016-08-23 
    Auerbach Publications
    Internal Audit and IT Audit

  • Data Privacy

    Principles and Practice

    By Nataraj Venkataramanan, Ashwin Shriram

    The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and…

    Hardback – 2016-08-22 
    Chapman and Hall/CRC

  • Introduction to Certificateless Cryptography

    By Hu Xiong, Zhen Qin, Athanasios V. Vasilakos

    As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications…

    Hardback – 2016-08-18 
    CRC Press

Product Search