IT Security Products

  • FinTech

    The Technology Driving Disruption in the Financial Services Industry

    By Parag Y Arjunwadkar

    Everything that we know about the world of finance is changing before us. Innovation is happening constantly, despite the protests of the traditional financial industry. With all the new technology that we have today, it is almost mind-blowing to think about the kind of technology that we will have…

    Hardback – 2018-05-15 
    Auerbach Publications

  • Future Internet Architecture Security

    By Bhawana Rudra

    The future of Internet security doesn’t lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for…

    Hardback – 2018-05-15 
    Auerbach Publications

  • Military Applications of Data Analytics

    Edited by Kevin Huggins

    Hardback – 2018-05-01 
    Auerbach Publications
    Data Analytics Applications

  • Personal Mobile Devices in the Enterprise

    Security and Privacy Concerns

    By Lawrence Gerard Dobranski

    Leaders of many public and private organizations face increased pressure to allow the use of personal mobile devices in their enterprises. This book provides an understanding of the increased risks that accompany the introduction of BYOD (Bring Your Own Device) into the enterprise.…

    Hardback – 2018-04-30 
    Auerbach Publications

  • The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications

    The Intelligent Cyber Shield for Smart Cities

    By Rocky Termanini

    Present anti-virus technologies do not have the symmetrical weaponry to defeat massive DDoS attacks on smart cities. Smart cities require a new set of holistic and AI-centric cognitive technology, such as autonomic components that replicate the human immune system, and a smart grid that connects…

    Hardback – 2018-04-04 
    CRC Press

  • Introduction to Public Key Cryptography

    By Hu Xiong

    In addition to laying the foundation for today’s online security industry, PKC made encryption technologies accessible to individuals and companies. In view of the many achievements of PKC, it should be accessible to most people. Yet, it is difficult to get a unified account of the evolution of PKC…

    Hardback – 2018-04-01 
    Auerbach Publications

  • Applied Cloud Deep Semantic Recognition

    Advanced Anomaly Detection

    Edited by Mehdi Roopaei, Peyman Najafirad (Paul Rad)

    This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key…

    Hardback – 2018-03-30 
    Auerbach Publications

  • Measurable and Composable Security, Privacy, and Dependability

    The SHIELD Methodology

    Edited by Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria

    With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the SPD requirements raised from existing and future IoT and M2M systems. On this baseline, it proposes a new approach to embedded systems SPD, the SHIELD philosophy, that relies on an…

    Hardback – 2018-01-09 
    CRC Press

  • Enterprise Information Security Management

    By Meng-Chow Kang

    The purpose of this course is to address the growing challenges of managing information security risks in enterprise and government organizations, prompted by the complexity and risks of today’s changing technological landscape, as well as increasingly demanding business aspirations. These…

    SVideo cassette – 2017-12-31 
    CRC Press

  • Information Security Management Systems

    A Novel Framework and Software as a Tool for Compliance with Information Security Standard

    By Heru Susanto, Mohammad Nabil Almunawar

    This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness…

    Hardback – 2017-12-15 
    Apple Academic Press

  • Big Data Analytics with Applications in Insider Threat Detection

    By Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan

    Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to…

    Hardback – 2017-12-05 
    Auerbach Publications

  • Empirical Research for Software Security

    Foundations and Experience

    Edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl

    Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that…

    Hardback – 2017-12-04 
    CRC Press
    Series in Security, Privacy and Trust

Product Search