IT Security Products

  • HIPAA and PCI Audits

    Secrets to Getting GREAT Results

    By Raj Goel

    This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling…

    Hardback – 2017-03-15 
    Auerbach Publications

  • Cyber-Security

    Geo-Politics, Law, and Policy

    By Amos N. Guiora

    This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement…

    Paperback – 2017-03-08 
    CRC Press

  • Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured…

    Paperback – 2017-02-28 
    CRC Press

  • Intrusion Detection Networks

    A Key to Collaborative Security

    By Carol Fung, Raouf Boutaba

    The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your…

    Paperback – 2017-02-28 
    Auerbach Publications

  • Implementing Cybersecurity

    A Guide to the National Institute of Standards and Technology Risk Management Framework

    By Anne Kohnke, Ken Sigler, Dan Shoemaker

    The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain…

    Hardback – 2017-02-22 
    Auerbach Publications
    Internal Audit and IT Audit

  • Cognitive Hack

    The New Battleground in Cybersecurity ... the Human Mind

    By James Bone

    This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security…

    Hardback – 2017-02-16 
    Auerbach Publications
    Internal Audit and IT Audit

  • Stalking

    Policing, Investigation, and Prevention

    By Karl Roberts, Michelle M. Garcia

    This book gives readers a deep knowledge and understanding of the characteristics and causes of stalking and practical insights into effective methods of policing. It describes the characteristics of stalking with reference to case study material and presents an overview of the psychological and…

    Hardback – 2017-02-15 
    CRC Press
    Advances in Police Theory and Practice

  • Walling Out the Insiders

    Controlling Access to Improve Organizational Security

    By Michael Erbschloe

    Paperback – 2017-02-10 
    Auerbach Publications

  • Information Security Management Systems

    A Novel Framework and Software as a Tool for Compliance with Information Security Standard

    By Heru Susanto, Mohammad Nabil Almunawar

    This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness…

    Hardback – 2016-12-31 
    Apple Academic Press

  • Ethics and the Internal Auditor's Political Dilemma

    Tools and Techniques to Evaluate a Company's Ethical Culture

    By Lynn Fountain

    This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA…

    Paperback – 2016-12-29 
    Auerbach Publications
    Internal Audit and IT Audit

  • Guide to Pairing-Based Cryptography

    Edited by Nadia El Mrabet, Marc Joye

    This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite…

    Hardback – 2016-12-17 
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Real-World Electronic Voting

    Design, Analysis and Deployment

    Edited by Feng Hao, Peter Y. A. Ryan

    Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting. This book explores…

    Hardback – 2016-12-15 
    Auerbach Publications
    Series in Security, Privacy and Trust

Product Search