IT Security Products

  • Security and Privacy in Internet of Things (IoTs)

    Models, Algorithms, and Implementations

    By Fei Hu

    IoT security refers to the safeguarding of connected devices and networks in the Internet of Things (IoT). This book covers the critical models, algorithms and implementations in security and privacy designs of IoTs. It specifically covers the following topics: (1) the attack models of IoTs, (2)…

    Hardback – 2016-02-23 
    CRC Press

  • Governance, Risk, and Compliance for PKI Operations

    By Jeff Stapleton, W. Clay Epstein

    Pragmatically, a PKI is an operational system that employs asymmetric cryptography, information technology, operating rules, physical and logical security, and legal matters. Much like any technology, cryptography in general undergoes changes: sometimes evolutionary, sometimes dramatically, and…

    Hardback – 2016-02-18 
    Auerbach Publications

  • CyberSecurity

    A Guide to the National Initiative for Cybersecurity Education (NICE) Framework (2.0)

    By Dan Shoemaker, Anne Kohnke, Ken Sigler

    This book explains the Department of Homeland Security (DHS) National Initiative for Cybersecurity Education (NICE) Framework (2.0). It is aimed at ensuring Bloom level two "comprehension" of the total concept and elements of the NICE model, and serve as the necessary guide to the content areas.…

    Hardback – 2016-02-08 
    Auerbach Publications
    Internal Audit and IT Audit

  • Network Security and Communication Engineering

    Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25–26, 2014

    Edited by Kennis Chan

    The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest…

    Hardback – 2016-01-31 
    CRC Press

  • Audit Education

    Edited by Karen A. Van Peursem, Elizabeth A. Monk, Richard M.S. Wilson, Ralph W. Adler

    Audit professionals are valued members of society and are expected to be both skilled and ethical in their decision-making. The role of the auditor extends far beyond that of counting beans by demanding a social and political awareness, a technical knowledge, ethical principles and relationship…

    Paperback – 2016-01-28 
    Special issue books from 'Accounting Education: an international journal'

  • The Cognitive Early Warning Predictive System Using the Smart Vaccine

    The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure

    By Rocky Termanini

    Here’s an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously survived smallpox did not contract the disease a second time. In fact, these survivors were often called upon to attend to those afflicted with smallpox. Consider this book…

    Hardback – 2016-01-05 
    Auerbach Publications

  • Honeypots and Routers

    Collecting Internet Attacks

    By Mohssen Mohammed, Habib-ur Rehman

    As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy…

    Hardback – 2015-12-30 
    Auerbach Publications

  • Encyclopedia of Information Systems and Technology - Two Volume Set

    Edited by Phillip A. Laplante

    Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology.The topics covered in this encyclopedia encompass internationally…

    Hardback – 2015-12-22 
    CRC Press

  • Cybercrime in Progress

    Theory and prevention of technology-enabled offenses

    By Thomas J Holt, Adam M Bossler

    The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these issues has increased dramatically over the last decade, as have studies on ways to prevent and police…

    Hardback – 2015-12-22 
    Crime Science Series

  • Anti-Spam Techniques Based on Artificial Immune System

    By Ying Tan

    Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial…

    Hardback – 2015-12-21 
    CRC Press

  • Securing an IT Organization through Governance, Risk Management, and Audit

    By Ken E. Sigler, James L. Rainey, III

    Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come…

    Hardback – 2015-12-18 
    Auerbach Publications
    Internal Audit and IT Audit

  • Color Atlas of Forensic Medicine and Pathology, Second Edition DVD

    Edited by Charles Catanese

    Featuring twice the number of images as any other forensic pathology atlas, this DVD version demonstrates visually the postmortem changes of the human body and the different kinds of patterns produced in deaths caused by natural causes, diagnostic or therapeutic procedures, substance abuse,…

    DVD – 2015-12-03 
    CRC Press

Product Search