Computing & IT Security Products

  • The Ethics of Cyber Conflicts

    An Introduction

    By Mariarosaria Taddeo

    During the past decade, ethicists as well as policy-makers, political and social scientists, and experts in military studies have been concerned with the topic of cyber-conflicts and in particular the political and social ramifications for contemporary society. This book offers a clear and…

    Paperback – 2018-05-01 
    Routledge
    The Ethics of ...

  • Security, Transportation, and the Supply Chain

    Mitigating Threats and Facilitating the Flow of Commerce

    By Luke Ritter

    The goal of security within the supply chain and transportation infrastructure is to effectively mitigate risks while facilitating commerce. Security and business protection measures are at the core of how to maintain consistent and strategic business operations. These expenses are assets that…

    Hardback – 2018-04-30 
    CRC Press

  • Hacker Culture and the New Rules of Innovation

    By Timothy Rayner

    Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company’s innovation pipeline. Innovation was a carefully planned process, driven from above, and tied to key strategic goals. Nowadays, innovation means…

    Paperback – 2018-03-22 
    Routledge

  • Enterprise Information Security Management

    By Meng-Chow Kang

    The purpose of this course is to address the growing challenges of managing information security risks in enterprise and government organizations, prompted by the complexity and risks of today’s changing technological landscape, as well as increasingly demanding business aspirations. These…

    SVideo cassette – 2017-12-31 
    CRC Press

  • Supply Chain Risk Management

    Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

    By Ken Sigler, Dan Shoemaker, Anne Kohnke

    The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply…

    Paperback – 2017-11-03
    Auerbach Publications
    Internal Audit and IT Audit

  • Cybercrime and Digital Forensics

    An Introduction, 2nd Edition

    By Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar

    This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of…

    Paperback – 2017-10-19
    Routledge

  • Railway Security

    Protecting Against Manmade and Natural Disasters

    By Richard R. Young, Gary A. Gordon, Jeremy F. Plant

    This book provides an overview and assessment of the security risks, both manmade and natural, facing the railways and rail networks. Railroads face significant threats from disasters, but with situational awareness and coordinated effort these can often be substantially minimized. Transportation…

    Hardback – 2017-08-10
    Routledge

  • Security Manager's Guide to Disasters

    Managing Through Emergencies, Violence, and Other Workplace Threats

    By Anthony D. Manley

    Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure—recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager’s…

    Paperback – 2017-07-13
    CRC Press

  • The Data Protection Officer

    Profession, Rules, and Role

    By Paul Lambert

    The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and…

    Hardback – 2016-12-13
    Auerbach Publications

  • Psychosocial Dynamics of Cyber Security

    Edited by Stephen J Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke

    This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security work in the US and around the world. With contributions from experts in the fields of industrial and organizational psychology, human factors, computer science, economics, and…

    Paperback – 2016-08-09
    Routledge
    Applied Psychology Series

  • Cyberthreats and the Decline of the Nation-State

    By Susan W. Brenner

    This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W.…

    Paperback – 2016-06-20
    Routledge
    Routledge Research in Information Technology and E-Commerce Law

  • Logistics and Transportation Security

    A Strategic, Tactical, and Operational Guide to Resilience

    By Maria G. Burns

    "Professor Burns has captured the essence of transportation security, one of today's most pressing concerns. As the rate of globalization and world trade increases, security and supply chain resilience are at the core of one’s global transportation network. This is a timely and well written…

    Hardback – 2015-10-22
    CRC Press

Product Search