Computing & IT Security Products

  • Cyber Fraud

    Tactics, Techniques and Procedures, 1st Edition

    By Rick Howard

    With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents…

    Paperback – 2019-10-10
    Auerbach Publications

  • Resilient Space Systems Design

    An Introduction, 1st Edition

    By Ron Burch

    Presenting a fundamental definition of resilience, the book examines the concept of resilience as it relates to space system design. The book establishes the required definitions, relates its place to existing state-of-the-art systems engineering practices, and explains the process and mathematical…

    Hardback – 2019-09-30
    CRC Press

  • Acquiring Card Payments

    1st Edition

    By Ilya Dubinsky

    This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card…

    Hardback – 2019-08-27
    Auerbach Publications

  • Social Engineering

    Hacking Systems, Nations, and Societies, 1st Edition

    By Michael Erbschloe

    This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and…

    Paperback – 2019-08-26
    CRC Press

  • Fundamentals of Internet of Things for Non-Engineers

    1st Edition

    Edited by Rebecca Lee Hammons, Ronald J. Kovac

    The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers, progressed to connecting people to people, and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare, excitement, and cheering. We’re now…

    Paperback – 2019-06-25
    Auerbach Publications
    Technology for Non-Engineers

  • Reinforcement Learning for Cyber-Physical Systems

    with Cybersecurity Case Studies, 1st Edition

    By Chong Li, Meikang Qiu

    Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different…

    Hardback – 2019-02-04
    Chapman and Hall/CRC

  • Blockchain in Healthcare

    Innovations that Empower Patients, Connect Professionals and Improve Care, 1st Edition

    By Vikram Dhillon, John Bass, Max Hooper, David Metcalf, Alex Cahana

    Blockchain technology is poised to revolutionize more than just payment and crypto-currency. Many vertical industries will be reshaped by the new trusted data models enabled and inspired by the blockchain – healthcare is no exception. In fact, healthcare may hold the greatest opportunities for…

    Hardback – 2019-01-25
    Productivity Press
    HIMSS Book Series

  • Software-Defined Networking and Security

    From Theory to Practice, 1st Edition

    By Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody

    This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending…

    Hardback – 2018-12-11
    CRC Press
    Data-Enabled Engineering

  • Internet of Things Security

    Challenges, Advances, and Analytics, 1st Edition

    By Chintan Patel, Nishant Doshi

    Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best…

    Paperback – 2018-08-22
    Auerbach Publications

  • Untangling Complex Systems

    A Grand Challenge for Science, 1st Edition

    By Pier Luigi Gentili

    Complex Systems are natural systems that science is unable to describe exhaustively. Examples of Complex Systems are both unicellular and multicellular living beings; human brains; human immune systems; ecosystems; human societies; the global economy; the climate and geology of our planet. This…

    Hardback – 2018-08-10
    CRC Press

  • Hacker Culture and the New Rules of Innovation

    1st Edition

    By Tim Rayner

    Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company’s innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means…

    Paperback – 2018-03-20
    Routledge

  • Supply Chain Risk Management

    Applying Secure Acquisition Principles to Ensure a Trusted Technology Product, 1st Edition

    By Ken Sigler, Dan Shoemaker, Anne Kohnke

    The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply…

    Paperback – 2017-11-03
    Auerbach Publications
    Internal Audit and IT Audit

1Series in Computing & IT Security

Product Search