Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing.
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics.
Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data-if that is indeed possible.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry.
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected.
Internal Audit Practice from A to Z addresses the practice of internal auditing using GAAS (Generally Accepted Auditing Standards), GAGAS (Generally Accepted Government Auditing Standards) and International Standards for the Professional Practice of Internal Auditing (Standards)-IPPF, International Standards Organization (ISO), International Standards of Supreme Audit Institutions (ISSAI), International Standards on Auditing (ISA) as enunciated by the Institute of Internal Auditors (IIA), International Organization of Standardizations (ISO), International Organization of Supreme Audit Institutions (INTOSAI), Government Accountability Office (GAO) & International Federation of Accountants (IFAC).
This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment.
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics.
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices.
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices.
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents.
The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.
Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications, and opportunities in the field of Artificial Intelligence.
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectivesThis fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102.
This quick review study guide offers 100% coverage of every topic on the latest version of the CISSP examGet on the fast track to becoming CISSP certified with this affordable, portable study tool.
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques.
Provides 100% coverage of every objective on the 2022 CISM examThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence.
This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP examThoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge.
Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the examCSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certification Consortium (ISC) .
This study guide offers 100% coverage of every objective for the Certified Data Privacy Solutions Engineer Exam This resource offers complete, up-to-date coverage of all the material included on the current release of the Certified Data Privacy Solutions Engineer exam.
This money-saving collection covers every objective for the CompTIA Security+ exam and contains exclusive bonus contentThis fully updated test preparation bundle covers every topic on the current version of the CompTIA Security+ exam.
This up-to-date study aid contains hundreds of accurate practice questions and detailed answer explanationsCompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601) is filled with more than 1000 realistic practice questions including new performance-based questions to prepare you for this challenging exam.
This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ examWith hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+ Certification Study Guide, Fourth Edition covers what you need to know and shows you how to prepare for this challenging exam.
A new edition of Shon Harris' bestselling exam prep guide-fully updated for the 2021 version of the CISSP examThoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2 .