IT Security Products

  • Ethics and the Internal Auditor's Political Dilemma

    Tools and Techniques to Evaluate a Company's Ethical Culture

    By Lynn Fountain

    This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA…

    Paperback – 2017-01-06 
    Auerbach Publications
    Internal Audit and IT Audit

  • Information Security Management Systems

    A Novel Framework and Software as a Tool for Compliance with Information Security Standard

    By Heru Susanto, Mohammad Nabil Almunawar

    This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness…

    Hardback – 2016-12-31 
    Apple Academic Press

  • Real-World Electronic Voting

    Design, Analysis and Deployment

    Edited by Feng Hao, Peter Y. A. Ryan

    Real-world Electronic Voting captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting. This book explores recent innovations in both…

    Hardback – 2016-12-21 
    Auerbach Publications
    Series in Security, Privacy and Trust

  • The Data Protection Officer

    Profession, Rules, and Role

    By Paul Lambert

    The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and…

    Hardback – 2016-12-21 
    Auerbach Publications

  • Biometrics in a Data Driven World

    Trends, Technologies, and Challenges

    Edited by Sinjini Mitra, Mikhail Gofman

    Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of…

    Hardback – 2016-12-19 
    Chapman and Hall/CRC

  • Guide to Pairing-Based Cryptography

    Edited by Nadia El Mrabet, Marc Joye

    This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite…

    Hardback – 2016-12-13 
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Protecting Mobile Networks and Devices

    Challenges and Solutions

    Edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou

    This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking…

    Hardback – 2016-12-09 
    Auerbach Publications
    Series in Security, Privacy and Trust

  • Private Investigation and Homeland Security

    By Daniel J. Benny

    The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of…

    Hardback – 2016-12-09 
    CRC Press

  • Cybercrime Through an Interdisciplinary Lens

    Edited by Thomas J. Holt

    Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from…

    Hardback – 2016-12-07 
    Routledge Studies in Crime and Society

  • Security and Auditing of Smart Devices

    Managing Proliferation of Confidential Data on Corporate and BYOD Devices

    By Sajay Rai, Philip Chukwuma, Richard Cozart

    Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the…

    Hardback – 2016-11-28 
    Auerbach Publications
    Internal Audit and IT Audit

  • Internal Audit Practice from A to Z

    By Patrick Onwura Nzechukwu

    This book addresses the practice of internal auditing using GAAS (Generally Accepted Auditing Standards), GAGAS (Generally Accepted Government Auditing Standards) and International Standards for the Professional Practice of Internal Auditing (Standards) as enunciated by the IIA. Unique in that it…

    Hardback – 2016-11-10 
    Auerbach Publications
    Internal Audit and IT Audit

  • Security for Wireless Sensor Networks using Identity-Based Cryptography

    By Harsh Kupwade Patil, Stephen A. Szygenda

    Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack…

    Paperback – 2016-10-31 
    Auerbach Publications

Product Search