IT Security Products

  • Introduction to Machine Learning with Applications in Information Security

    By Mark Stamp

    This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of applications in information security. The book will cover malware detection, cryptography, and intrusion detection. The book will be relevant for students in machine learning…

    Hardback – 2017-06-12 
    Chapman and Hall/CRC
    Chapman & Hall/CRC Machine Learning & Pattern Recognition

  • Social Media Warfare

    Equal Weapons for All

    By Michael Erbschloe

    Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and…

    Hardback – 2017-05-26 
    Auerbach Publications

  • Practitioner’s Guide to Business Impact Analysis

    By Priti Sikdar

    This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists…

    Hardback – 2017-05-17 
    Auerbach Publications
    Internal Audit and IT Audit

  • Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured…

    Paperback – 2017-04-30 
    CRC Press

  • Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your…

    Paperback – 2017-04-30 
    Auerbach Publications

  • Cybercrime in Progress

    Theory and prevention of technology-enabled offenses

    By Thomas J Holt, Adam M Bossler

    The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these issues has increased dramatically over the last decade, as have studies on ways to prevent and police…

    Paperback – 2017-04-27 
    Routledge
    Crime Science Series

  • Wireless Multimedia Communication Systems

    Design, Analysis, and Implementation

    By K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to…

    Paperback – 2017-03-31 
    CRC Press

  • Multimedia Security

    Watermarking, Steganography, and Forensics

    Edited by Frank Y. Shih

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the…

    Paperback – 2017-03-31 
    CRC Press

  • HIPAA and PCI Audits

    Secrets to Getting GREAT Results

    By Raj Goel

    This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling…

    Hardback – 2017-03-15
    Auerbach Publications

  • Data Analytics for Internal Auditors

    By Richard E. Cascarino

    There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that…

    Hardback – 2017-03-15
    Auerbach Publications
    Internal Audit and IT Audit

  • The CISO Journey

    Life Lessons and Concepts to Accelerate Your Professional Development

    By Eugene M Fredriksen

    The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each…

    Hardback – 2017-03-13
    Auerbach Publications
    Internal Audit and IT Audit

  • Implementing Cybersecurity

    A Guide to the National Institute of Standards and Technology Risk Management Framework

    By Anne Kohnke, Ken Sigler, Dan Shoemaker

    The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain…

    Hardback – 2017-03-08
    Auerbach Publications
    Internal Audit and IT Audit

Product Search