Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems.
Intrusion Detection Networks: A Key to Collaborative Security supplies a complete introduction to intrusion detection systems (IDS) and intrusion detection networks (IDN).
Understanding the financial motivations behind white collar crime is often the key to the apprehension and successful prosecution of these individuals.
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively cover Game SteganographyAlthough the goal of steganography is to prevent adversaries from suspe
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents.
Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions.
Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard.
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS).
From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers.
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security.
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects.
From Main Street to Mumbai, Managing Emerging Risk: The Capstone of Preparedness considers the new global drivers behind threats and hazards facing all those tasked with protecting the public and private sector.
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack.
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas.
It is imperative that educators, parents, and potential victims be aware of sexual predators, the danger they pose in our society, and the resources available to help prevent this growing epidemic.
This book discusses how built-in and third-party networking tools can be used to diagnose network problems and performance issues as well as enhance the security of computer systems.
This text teaches students basic software engineering skills and helps practitioners refresh their knowledge and explore recent developments in the field, including software changes and iterative processes of software development.
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices.
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020.
In a world increasingly driven by technology, this book explores the intersection of artificial intelligence (AI), IoT, and Cloud Computing and women's safety, highlighting the transformative potential of technology in safeguarding women's well-being in the physical and the digital world.
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing.
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner.