Security Services Products

  • Ion Mobility Spectrometry - Mass Spectrometry

    Theory and Applications

    Edited by Charles L. Wilkins, Sarah Trimpin

    The analytical power of ion mobility spectrometry-mass spectrometry (IMS-MS) instruments is poised to advance this technology from research to analytical laboratories. Exploring these developments at this critical juncture, Ion Mobility Spectrometry-Mass Spectrometry: Theory and Applications covers…

    Paperback – 2017-02-28 
    CRC Press

  • How to Design and Successfully Accomplish a Business Continuity Program

    By Barbara F. Davi

    The objective of a business continuity plan is to ensure that your business will be able to continue operating in the event of a disruption in service caused by a natural or man-made incident. This book provides a framework for businesses to assess their general and specific risks, determine…

    Hardback – 2017-02-15 
    CRC Press

  • Understanding and Combating Terrorist Financing

    Edited by Amit Kumar, Dennis M. Lormel

    In an increasingly open society and global economy, the issue of terrorist financing is demanding increased attention from diverse financial institutions and charitable organizations across the public and private spectrum. Even inadvertent association can result in a host of negative consequences…

    Hardback – 2017-01-26 
    CRC Press
    Public Administration and Public Policy

  • Intelligent Network Video

    Understanding Modern Video Surveillance Systems, Second Edition

    By Fredrik Nilsson, Communications Axis

    Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs. It addresses in full detail updated specifications on…

    Hardback – 2016-11-21
    CRC Press

  • Information Security Management Handbook, Sixth Edition, Volume 6

    6th Edition

    Edited by Harold F. Tipton, Micki Krause Nozaki

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it…

    Paperback – 2016-11-16
    Auerbach Publications

  • Noiseless Steganography

    The Key to Covert Communications

    By Abdelrahman Desoky

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the…

    Paperback – 2016-11-16
    Auerbach Publications

  • The Facility Manager's Guide to Safety and Security

    By John W. Henderson

    A guide for facility managers of varying types of facilities including, apartment buildings/complexes, office buildings, retail stores, educational facilities (schools), restaurants, and countless others. It will look specifically at the physical similarities inherent in all buildings/facilities…

    Paperback – 2016-08-24
    CRC Press

  • Practical Cloud Security

    A Cross-Industry View

    By Melvin B. Greer, Jr., Kevin L. Jackson

    Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of…

    Hardback – 2016-08-02
    CRC Press

  • Business Theft and Fraud

    Detection and Prevention

    By James R. Youngblood

    Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current…

    Paperback – 2016-07-25
    CRC Press

  • Electronically Stored Information

    The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

    By David R. Matthews

    Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or…

    Hardback – 2016-05-23
    Auerbach Publications

  • Information Security Policies, Procedures, and Standards

    A Practitioner's Reference

    By Douglas J. Landoll

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the…

    Hardback – 2016-05-05
    Auerbach Publications

  • The Complete Guide to Cybersecurity Risks and Controls

    By Anne Kohnke, Dan Shoemaker, Ken E. Sigler

    The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day…

    Hardback – 2016-04-04
    Auerbach Publications
    Internal Audit and IT Audit

Product Search