IT Security Products

  • Honeypots and Routers

    Collecting Internet Attacks

    By Mohssen Mohammed, Habib-ur Rehman

    One approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This can be accomplished through the use of honeypots and routers. This book provides readers with an understanding of honeypot concepts and architecture as well as…

    Hardback – 2015-11-11 
    Auerbach Publications

  • The Cognitive Early Warning Predictive System Using the Smart Vaccine

    The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure

    By Rocky Termanini

    This book brings to light the concept of digital Immunity and how it can be applied to combat cybercrime and terrorism. The Cognitive Early Warning Predictive System (CEWPS) is in fact the new Digital Immune System. The book describes the landscape of cyber warfare, vulnerability of the critical…

    Hardback – 2015-11-09 
    Auerbach Publications

  • Securing Cyber-Physical Systems

    Edited by Al-Sakib Khan Pathan

    This book explores the cyber security needed for cyber-physical systems (CPSs), with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. Cyber-physical systems have emerged from traditional engineered systems in power and…

    Hardback – 2015-10-15 
    CRC Press

  • Leading the Internal Audit Function

    By Lynn Fountain

    Books on internal audit deal with leading practice concepts and IIA standards. The challenge comes when dealing with management, trying to balance independence and objectivity while also being an employee of the company. Many CAEs become complacent in the requirements of skepticism and objectivity…

    Hardback – 2015-10-11 
    Auerbach Publications
    Internal Audit and IT Audit

  • Global Information Warfare

    The New Digital Battlefield, Second Edition

    By Andrew Jones, Gerald L. Kovacich

    Since the turn of the century, much has happened in the world of politics, governments, spying, technology, global businesses, mobile communications, and global competition on nation and corporate levels. This book underscores how hostile countries, business competitors, terrorists, and others are…

    Hardback – 2015-10-05 
    Auerbach Publications

  • Business Continuity Planning

    A Project Management Approach

    By Ralph L. Kliem, Gregg D. Richie

    If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations, would your organization be prepared to respond to the financial, political, and social impacts? In order for your company to be resilient, it must be ready to respond and…

    Hardback – 2015-08-26 
    Auerbach Publications

  • Touchless Fingerprint Biometrics

    By Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced…

    Hardback – 2015-08-19 
    CRC Press
    Series in Security, Privacy and Trust

  • The Complete Guide for CPP Examination Preparation, 2nd Edition

    By Anthony V. DiSalvatore (CPP, PSP & PCI)

    Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering…

    Hardback – 2015-07-20
    Auerbach Publications

  • Network Security and Communication Engineering

    Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25–26, 2014

    Edited by Kennis Chan

    The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest…

    Hardback – 2015-07-12
    CRC Press

  • Intelligence-Based Security in Private Industry

    By Thomas A. Trier

    In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to…

    Hardback – 2015-06-21
    CRC Press

  • Multilevel Modeling of Secure Systems in QoP-ML

    By Bogdan Księżopolski

    In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and…

    Hardback – 2015-06-09
    Auerbach Publications

  • Securing Systems

    Applied Security Architecture and Threat Models

    By Brook S. E. Schoenfield

    Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This…

    Hardback – 2015-05-19
    CRC Press

Product Search