IT Security Products

  • Data Privacy

    Principles and Practice

    By Nataraj Venkataramanan, Ashwin Shriram

    This book discusses data privacy in banking and financial services, anonymization principles and practice, test data management, and synthetic data generation. From a practice standpoint, it provides practitioners and researchers with a definitive guide to approach anonymization of various data…

    Hardback – 2016-08-25 
    Chapman and Hall/CRC

  • Introduction to Certificateless Cryptography

    By Hu Xiong, Zhen Qin, Athanasios V. Vasilakos

    As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications…

    Hardback – 2016-08-18 
    CRC Press

  • Corporate Defense and the Value Preservation Imperative

    Bulletproof Your Corporate Defense Program

    By Sean Lyons

    This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s…

    Hardback – 2016-08-16 
    Auerbach Publications
    Internal Audit and IT Audit

  • Insider's Guide to Cyber Security Architecture

    By Brook S. E. Schoenfield

    This book is filled with techniques, tips, and tricks that secure software architects and developers can apply directly. From assessing the sensitivity of data in a system through actually getting requirements implemented, this book offers readers practical, how-to advice in small, focused and…

    Hardback – 2016-08-15 
    Auerbach Publications

  • Network and Data Security for Non-Engineers

    By Frank M. Groom, Kevin Groom, Stephan S. Jones

    Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful…

    Paperback – 2016-08-11 
    Auerbach Publications

  • Fundamentals of Medical Practice Investigation

    By Jeffrey D. Lane

    This area of criminal investigation has very few published resourses available. it provide the novice medical investigator a resource to guide them through the investigative process. Seasoned medical investigators may find the work useful as a tool to refresh their skills. It is developed to bring…

    Hardback – 2016-07-29 
    CRC Press

  • Practical Cloud Security

    A Cross-Industry View

    By Melvin B. Greer, Jr., Kevin L. Jackson

    Cloud computing is a technical evolution and the blend of highly automated IT with various industry business models. It has created an explosion of cloud-driven business service solutions, creating industry-specific cloud security challenges. The authors use executive level survey data,…

    Hardback – 2016-07-20 
    CRC Press

  • Protocols for Secure Electronic Commerce, Third Edition

    By Mostafa Hashem Sherif

    Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:…

    Hardback – 2016-05-25
    CRC Press

  • Circuits and Systems for Security and Privacy

    Edited by Farhana Sheikh, Leonel Sousa

    Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of…

    Hardback – 2016-05-24
    CRC Press
    Devices, Circuits, and Systems

  • Electronically Stored Information

    The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

    By David R. Matthews

    Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or…

    Hardback – 2016-05-24
    Auerbach Publications

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with…

    Hardback – 2016-05-13
    Chapman and Hall/CRC

  • Enterprise Level Security

    Securing Information Systems in an Uncertain World

    By William R. Simpson

    Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized,…

    Hardback – 2016-05-13
    Auerbach Publications

Product Search