Security Services Products

  • Security Surveillance Centers

    Design, Implementation, and Operation

    By Anthony V. DiSalvatore

    Security Surveillance Centers covers the critical areas of the design, implementation, and operation of security surveillance centers regardless of their size. It details the role of security surveillance, use of the control room and console design, processes, procedures, legal perspectives, and…

    Hardback – 2017-01-01 
    CRC Press

  • Information Security Management Handbook, Sixth Edition, Volume 6

    6th Edition

    Edited by Harold F. Tipton, Micki Krause Nozaki

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it…

    Paperback – 2016-10-31 
    Auerbach Publications

  • Noiseless Steganography

    The Key to Covert Communications

    By Abdelrahman Desoky

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the…

    Paperback – 2016-10-31 
    Auerbach Publications

  • The Facility Manager's Guide to Safety and Security

    By John W. Henderson

    A guide for facility managers of varying types of facilities including, apartment buildings/complexes, office buildings, retail stores, educational facilities (schools), restaurants, and countless others. It will look specifically at the physical similarities inherent in all buildings/facilities…

    Paperback – 2016-08-24
    CRC Press

  • Business Theft and Fraud

    Detection and Prevention

    By James R. Youngblood

    Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current…

    Paperback – 2016-08-16
    CRC Press

  • Practical Cloud Security

    A Cross-Industry View

    By Melvin B. Greer, Jr., Kevin L. Jackson

    Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of…

    Hardback – 2016-08-02
    CRC Press

  • Electronically Stored Information

    The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

    By David R. Matthews

    Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or…

    Hardback – 2016-05-24
    Auerbach Publications

  • Information Security Policies, Procedures, and Standards

    A Practitioner's Reference

    By Douglas J. Landoll

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the…

    Hardback – 2016-05-05
    Auerbach Publications

  • The Complete Guide to Cybersecurity Risks and Controls

    By Anne Kohnke, Dan Shoemaker, Ken E. Sigler

    The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day…

    Hardback – 2016-04-04
    Auerbach Publications
    Internal Audit and IT Audit

  • A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

    By Dan Shoemaker, Anne Kohnke, Ken Sigler

    A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship…

    Hardback – 2016-02-08
    Auerbach Publications
    Internal Audit and IT Audit

  • Introduction to Executive Protection, Third Edition

    By Dale L. June

    At a time when personal security risks are on the rise internationally, Introduction to Executive Protection, Third Edition takes readers beyond "the wizard’s curtain" of fear, unawareness, and surprise to give them the tools to sharpen or renew their skills so those they are tasked with…

    Hardback – 2015-12-01
    CRC Press

  • The Struggle for Influence in the Middle East

    The Arab Uprisings and Foreign Assistance

    Edited by Federica Bicchi, Benoit Challand, Steven Heydemann

    This collection of research papers explores the impact of the Arab uprisings on the politics and political economy of foreign aid provision in the MENA region. Contributions focus on the foreign assistance policies and strategies of key donors (United States, Europe, Gulf countries and Turkey), and…

    Hardback – 2015-11-30
    Routledge
    Routledge Studies in Mediterranean Politics

Product Search