IT Security Products

  • Protecting Mobile Networks and Devices

    Challenges and Solutions

    Edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou

    This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking…

    Hardback – 2016-12-08 
    Auerbach Publications
    Series in Security, Privacy and Trust

  • Cybercrime Through an Interdisciplinary Lens

    Edited by Thomas J. Holt

    Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from…

    Hardback – 2016-12-07 
    Routledge
    Routledge Studies in Crime and Society

  • Security and Auditing of Smart Devices

    Managing Proliferation of Confidential Data on Corporate and BYOD Devices

    By Sajay Rai, Philip Chuckwuma, Richard Cozart

    Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the…

    Hardback – 2016-11-30 
    Auerbach Publications
    Internal Audit and IT Audit

  • Guide to Pairing-Based Cryptography

    Edited by Nadia El Mrabet, Marc Joye

    This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite…

    Hardback – 2016-11-14 
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Internal Audit Practice from A to Z

    By Patrick Onwura Nzechukwu

    This book addresses the practice of internal auditing using GAAS (Generally Accepted Auditing Standards), GAGAS (Generally Accepted Government Auditing Standards) and International Standards for the Professional Practice of Internal Auditing (Standards) as enunciated by the IIA. Unique in that it…

    Hardback – 2016-11-08 
    Auerbach Publications
    Internal Audit and IT Audit

  • Study Guide for TOGAF 9.1 Certifications

    By B. V. Kumar

    This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ‘The TOGAF Foundation Certification’ and ‘The TOGAF Certified Certification’ will find this book useful. The contents of the book…

    Hardback – 2016-10-31 
    Chapman and Hall/CRC

  • Ethics and the Internal Auditor's Political Dilemma

    Tools and Techniques to Evaluate a Company's Ethical Culture

    By Lynn Fountain

    This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA…

    Paperback – 2016-10-28 
    Auerbach Publications
    Internal Audit and IT Audit

  • Operational Auditing

    Principles and Techniques for a Changing World

    By Hernan Murdock

    Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance risks at the expense of operational, strategic and technological ones. This limits their ability to evaluate critical risks and processes. This book merges traditional…

    Hardback – 2016-10-27 
    Auerbach Publications
    Internal Audit and IT Audit

  • Location Privacy in Wireless Sensor Networks

    By Ruben Rios, Javier Lopez, Jorge Cuellar

    Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor…

    Hardback – 2016-10-10 
    CRC Press
    Series in Security, Privacy and Trust

  • Data Analytics for Internal Auditors

    By Richard E. Cascarino

    There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that…

    Hardback – 2016-10-03 
    Auerbach Publications
    Internal Audit and IT Audit

  • CBAP® Certification and BABOK® Study Guide

    By Hans Jonasson

    The book covers all knowledge areas from the BABOK®, Third Edition, and is designed to be a study guide for the CBAP® certification from IIBA™. It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA® certification. This book is a complete business analysis handbook…

    Hardback – 2016-10-03 
    Auerbach Publications

  • Corporate Defense and the Value Preservation Imperative

    Bulletproof Your Corporate Defense Program

    By Sean Lyons

    This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s…

    Hardback – 2016-09-07 
    Auerbach Publications
    Internal Audit and IT Audit

Product Search