Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
Soft computing techniques have the ability to handle complex, uncertain, and imprecise information to create usable solutions to convoluted problems, or those just too time-consuming to solve with current hardware.
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations.
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks.
Port-based authentication is a "e;network access control"e; concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network.
Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy.
The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes.
Written by a team of subject matter experts, many of them CISSP exam prep course instructors, this book is primarily a test prep book, not a study guide.
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process.
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios.
Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions.
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field.
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes.
Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver.
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers.