IT Security Products

  • Mastering the Five Tiers of Audit Competency

    The Essence of Effective Auditing

    By Ann Butera

    Unlike compliance and Sarbanes-Oxley audits, risk-based operational audits and performance audits require a broad array of competencies. This is a book for auditors and risk professionals who want to improve their results during risk-based audits. Each section of this self-help book is devoted to a…

    Paperback – 2016-05-17 
    Auerbach Publications
    Internal Audit and IT Audit

  • Protocols for Secure Electronic Commerce, Third Edition

    By Mostafa Hashem Sherif

    The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this…

    Hardback – 2016-05-11 
    CRC Press

  • Enterprise Level Security

    Securing Information Systems in an Uncertain World

    By William R. Simpson

    Increasing complexity and new computing hardware and techniques have made the fortress approach to security espoused by NIST and implemented throughout the defense and banking industry unworkable. This book provides a modern alternative to this approach. The new approach to security is more…

    Hardback – 2016-04-29 
    Auerbach Publications

  • Software Quality Assurance

    Integrating Testing, Security, and Audit

    By Abu Sayed Mahfuz

    This book demystifies the ISO 17799 standards with practical examples from real-world experience. It defines all kinds of testing, recognizes the factors that propose value to software quality, and provides theoretical and real-world scenarios. The practical synopsis on common testing tools will…

    Hardback – 2016-04-25 
    Auerbach Publications
    Internal Audit and IT Audit

  • The Complete Guide to CyberSecurity Risks and Controls

    By Anne Kohnke, Dan Shoemaker, Ken E. Sigler

    The Complete Guide to CyberSecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day…

    Hardback – 2016-04-18 
    Auerbach Publications
    Internal Audit and IT Audit

  • Circuits and Systems for Security and Privacy

    Edited by Farhana Sheikh, Leonel Sousa

    Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of…

    Hardback – 2016-04-15 
    CRC Press
    Devices, Circuits, and Systems

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    This book introduces readers to how vulnerabilities in computer networks can be exploited by intruders through sending mass requests beyond the capacity of the system. It explains in a practical manner how an attacker develops a tool to launch DDoS attacks of various types by compromising a large…

    Hardback – 2016-04-11 
    Chapman and Hall/CRC

  • Analyzing and Securing Social Networks

    By Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan, Vaibhav Khadilkar, Satyen Abrol, Raymond Heatherly

    Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of…

    Hardback – 2016-04-08 
    Auerbach Publications

  • Information Security Policies, Procedures, and Standards

    A Practitioner's Reference

    By Douglas Landoll

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the…

    Hardback – 2016-04-07 
    Auerbach Publications

  • Security and Privacy in Internet of Things (IoTs)

    Models, Algorithms, and Implementations

    By Fei Hu

    The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts…

    Hardback – 2016-03-30 
    CRC Press

  • Operational Assessment of IT

    By Steve Katzman

    Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization’s business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks,…

    Hardback – 2016-03-28 
    Auerbach Publications
    Internal Audit and IT Audit

  • Cyber Security for Industrial Control Systems

    From the Viewpoint of Close-Loop

    Edited by Peng Cheng, Heng Zhang, Jiming Chen

    Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of…

    Hardback – 2016-03-23 
    CRC Press

Product Search