IT Security Products

  • Big Data Analytics with Applications in Insider Threat Detection

    By Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan

    Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to…

    Hardback – 2017-12-05 
    Auerbach Publications

  • Valuing Data

    An Open Framework

    By Dewey E. Ray

    Data has value, but our accounting methods do not give data a monetary value, and as a result, business executives lack the necessary information to make the most effective decisions about how to best manage and leverage this valuable asset. This book presents a straight-forward, well-researched,…

    Hardback – 2017-11-22 
    Taylor & Francis

  • Supply Chain Risk Management

    Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

    By Anne Kohnke, Ken Sigler, Dan Shoemaker

    The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply…

    Paperback – 2017-11-17 
    Auerbach Publications
    Internal Audit and IT Audit

  • Collaborative Cyber Threat Intelligence

    Detecting and Responding to Advanced Cyber Attacks on National Level

    Edited by Florian Skopik

    Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to…

    Hardback – 2017-11-13 
    Auerbach Publications

  • Anti-Spam Techniques Based on Artificial Immune System

    By Ying Tan

    Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial…

    Paperback – 2017-11-01 
    CRC Press

  • Study Guide for TOGAF 9.1 Certifications

    By B. V. Kumar

    This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ‘The TOGAF Foundation Certification’ and ‘The TOGAF Certified Certification’ will find this book useful. The contents of the book…

    Hardback – 2017-10-31 
    Chapman and Hall/CRC

  • Cybercrime and Digital Forensics

    An Introduction, 2nd Edition

    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of…

    Paperback – 2017-10-30 
    Routledge

  • Cyberspace and Cybersecurity, Second Edition

    By George Kostopoulos

    Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include…

    Hardback – 2017-10-18 
    Auerbach Publications

  • Technocrime and Criminological Theory

    Edited by Kevin F. Steinmetz, Matt R. Nobles

    Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist…

    Paperback – 2017-10-10 
    CRC Press

  • Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured…

    Paperback – 2017-09-30 
    CRC Press

  • Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your…

    Paperback – 2017-09-30 
    Auerbach Publications

  • Fraud Hotlines

    Design, Performance, and Assessment

    By Chelsea A. Binns

    This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines.…

    Hardback – 2017-09-27 
    Auerbach Publications

Product Search