IT Security Products

  • Corporate Defense and the Value Preservation Imperative

    Bulletproof Your Corporate Defense Program

    By Sean Lyons

    This book explores corporate defense, which is an organization’s obligation to implement a comprehensive corporate defense program in order to deliver long-term sustainable value to their stakeholders. It considers the challenges of implementing a world class corporate defense program and looks at…

    Hardback – 2016-08-16 
    Auerbach Publications
    Internal Audit and IT Audit

  • Insider's Guide to Cyber Security Architecture

    By Brook S. E. Schoenfield

    This book is filled with techniques, tips, and tricks that secure software architects and developers can apply directly. From assessing the sensitivity of data in a system through actually getting requirements implemented, this book offers readers practical, how-to advice in small, focused and…

    Hardback – 2016-08-15 
    Auerbach Publications

  • Network and Data Security for Non-Engineers

    By Frank M. Groom, Kevin Groom, Stephan S. Jones

    Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful…

    Paperback – 2016-08-04 
    Auerbach Publications

  • Fundamentals of Medical Practice Investigation

    By Jeffrey D. Lane

    This area of criminal investigation has very few published resourses available. it provide the novice medical investigator a resource to guide them through the investigative process. Seasoned medical investigators may find the work useful as a tool to refresh their skills. It is developed to bring…

    Hardback – 2016-07-29 
    CRC Press

  • Practical Cloud Security

    A Cross-Industry View

    By Melvin B. Greer, Jr., Kevin L. Jackson

    Cloud computing is a technical evolution and the blend of highly automated IT with various industry business models. It has created an explosion of cloud-driven business service solutions, creating industry-specific cloud security challenges. The authors use executive level survey data,…

    Hardback – 2016-07-20 
    CRC Press

  • Protocols for Secure Electronic Commerce, Third Edition

    By Mostafa Hashem Sherif

    Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:…

    Hardback – 2016-06-06 
    CRC Press

  • Circuits and Systems for Security and Privacy

    Edited by Farhana Sheikh, Leonel Sousa

    Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of…

    Hardback – 2016-06-06 
    CRC Press
    Devices, Circuits, and Systems

  • Electronically Stored Information

    The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

    By David R. Matthews

    Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or…

    Hardback – 2016-06-06 
    Auerbach Publications

  • Information Security Policies, Procedures, and Standards

    A Practitioner's Reference

    By Douglas J. Landoll

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the…

    Hardback – 2016-05-25 
    Auerbach Publications

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with…

    Hardback – 2016-05-04
    Chapman and Hall/CRC

  • Mastering the Five Tiers of Audit Competency

    The Essence of Effective Auditing

    By Ann Butera

    Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing…

    Paperback – 2016-05-02
    Auerbach Publications
    Internal Audit and IT Audit

  • Enterprise Level Security

    Securing Information Systems in an Uncertain World

    By William R. Simpson

    Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized,…

    Hardback – 2016-04-29
    Auerbach Publications

Product Search