IT Security Products

  • Security Analytics for the Internet of Everything

    1st Edition

    Edited by Mohiuddin Ahmed, Abu Barkat, Al-Sakib Khan Pathan

    This book addresses security analytics for the Internet of Everything. It provides a big picture on the concepts, techniques, applications, and open research directions. It is a single source of reference for graduate students, researchers, academics, and practitioners working in the area of cyber…

    Hardback – 2020-02-17 
    CRC Press

  • Big Data with Hadoop MapReduce

    A Classroom Approach, 1st Edition

    By Rathinaraja Jeyaraj, Pugalendhi, PhD Ganeshkumar, Anand Paul

    The authors of Big Data with Hadoop MapReduce: A Classroom Approach have framed the book to facilitate understanding big data and MapReduce by visualizing the basic terminologies and concepts. They employed over 100 illustrations and many worked-out examples to convey the concepts and methods used…

    Hardback – 2020-01-15 
    Apple Academic Press

  • The Evolution of Business in the Cyber Age

    Digital Transformation, Threats, and Security, 1st Edition

    Edited by Divya Gupta Chowdhry, Rahul Verma, Manisha Mathur

    This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and maintaining effective cyber protection. The book…

    Hardback – 2019-12-30 
    Apple Academic Press

  • Storing Digital Binary Data into DNA Cells

    The New Paradigm, 1st Edition

    By Rocky Termanini

    The idea of storing digital data in a DNA living cell is truly mind blowing. It is the most optimum option because conventional storage is asymptotically going to hit the wall soon. We can encode images and movies into DNA in a living cell that acts as a molecular recorder and collects data over…

    Hardback – 2019-12-13 
    CRC Press

  • Human Dimensions of Cybersecurity

    1st Edition

    By Terry Bossomaier, Steven D'Alessandro, Roger Bradbury

    The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these…

    Hardback – 2019-11-26 
    Auerbach Publications

  • The Biometric Computing

    Recognition and Registration, 1st Edition

    Edited by Karm Veer Arya, Robin Singh Bhadoria

    "The Biometric Computing: Recognition & Registration" presents introduction of biometrics along with detailed analysis for identification and recognition methods. This book forms the required platform for understanding biometric computing and its implementation for securing target system. It…

    Hardback – 2019-11-22 
    Chapman and Hall/CRC

  • Botnets

    Architectures, Countermeasures, and Challenges, 1st Edition

    Edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou

    This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters…

    Hardback – 2019-10-08
    CRC Press
    Series in Security, Privacy and Trust

  • The IoT Architect's Guide to Attainable Security and Privacy

    1st Edition

    By Damilare D. Fagbemi, David M Wheeler, JC Wheeler

    This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of…

    Hardback – 2019-10-04
    Auerbach Publications

  • Introduction to Privacy-Preserving Data Publishing

    Concepts and Techniques, 1st Edition

    By Benjamin C.M. Fung, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu

    Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of…

    Paperback – 2019-09-19
    Chapman and Hall/CRC

  • Computer Forensics

    Evidence Collection and Management, 1st Edition

    By Robert C. Newman

    Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and…

    Paperback – 2019-09-19
    Auerbach Publications

  • Network Perimeter Security

    Building Defense In-Depth, 1st Edition

    By Cliff Riggs

    Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are…

    Paperback – 2019-09-19
    Auerbach Publications

  • How to Achieve 27001 Certification

    An Example of Applied Compliance Management, 1st Edition

    By Sigurjon Thor Arnason, Keith D. Willett

    The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process. Using security standards ISO 17799 and ISO 27001 as a basis, How to Achieve 27001 Certification:…

    Paperback – 2019-09-19
    Auerbach Publications

Product Search