Security Services Products

  • Information Security Management Handbook, Sixth Edition, Volume 6

    6th Edition

    Edited by Harold F. Tipton, Micki Krause Nozaki

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it…

    Paperback – 2016-09-30 
    Auerbach Publications

  • Ion Mobility Spectrometry - Mass Spectrometry

    Theory and Applications

    Edited by Charles L. Wilkins, Sarah Trimpin

    The analytical power of ion mobility spectrometry-mass spectrometry (IMS-MS) instruments is poised to advance this technology from research to analytical laboratories. Exploring these developments at this critical juncture, Ion Mobility Spectrometry-Mass Spectrometry: Theory and Applications covers…

    Paperback – 2016-09-30 
    CRC Press

  • Noiseless Steganography

    The Key to Covert Communications

    By Abdelrahman Desoky

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the…

    Paperback – 2016-09-30 
    Auerbach Publications

  • Workplace Violence

    Issues in Threat Management

    By Eugene A. Rugala, Carri Casteel, David E. Bixler, Christina M. Holbrook

    Workplace Violence: Issues in Threat Management defines what workplace violence is, delves into the myths and realities surrounding the topic and provides readers with the latest statistics, thinking and strategies in the prevention of workplace violence. The authors, who themselves have…

    Hardback – 2016-09-26 
    CRC Press

  • The Facility Manager's Guide to Safety and Security

    By John W. Henderson

    A guide for facility managers of varying types of facilities including, apartment buildings/complexes, office buildings, retail stores, educational facilities (schools), restaurants, and countless others. It will look specifically at the physical similarities inherent in all buildings/facilities…

    Paperback – 2016-08-24
    CRC Press

  • Business Theft and Fraud

    Detection and Prevention

    By James R. Youngblood

    Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current…

    Paperback – 2016-08-16
    CRC Press

  • Practical Cloud Security

    A Cross-Industry View

    By Melvin B. Greer, Jr., Kevin L. Jackson

    Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of…

    Hardback – 2016-08-02
    CRC Press

  • Electronically Stored Information

    The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

    By David R. Matthews

    Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or…

    Hardback – 2016-05-24
    Auerbach Publications

  • Information Security Policies, Procedures, and Standards

    A Practitioner's Reference

    By Douglas J. Landoll

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the…

    Hardback – 2016-05-05
    Auerbach Publications

  • The Complete Guide to Cybersecurity Risks and Controls

    By Anne Kohnke, Dan Shoemaker, Ken E. Sigler

    The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day…

    Hardback – 2016-04-04
    Auerbach Publications
    Internal Audit and IT Audit

  • A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

    By Dan Shoemaker, Anne Kohnke, Ken Sigler

    A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship…

    Hardback – 2016-02-08
    Auerbach Publications
    Internal Audit and IT Audit

  • Introduction to Executive Protection, Third Edition

    By Dale L. June

    At a time when personal security risks are on the rise internationally, Introduction to Executive Protection, Third Edition takes readers beyond "the wizard’s curtain" of fear, unawareness, and surprise to give them the tools to sharpen or renew their skills so those they are tasked with…

    Hardback – 2015-12-01
    CRC Press

Product Search