As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical.
Human Factors and Cybersecurity examines the intricate interplay between human behaviour and digital security, offering a comprehensive exploration of how psychological, dispositional, and situational factors influence cybersecurity practices.
Mobile, wearable, and self-driving telephones are just a few examples of modern distributed networks that generate enormous amount of information every day.
Mobile, wearable, and self-driving telephones are just a few examples of modern distributed networks that generate enormous amount of information every day.
In a rapidly evolving world where technology is increasingly integrated into our daily lives, security has become a top priority for individuals, organizations, and governments.
Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for any size organization.
As a result of a rigorous, methodical process that (ISC) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015.
This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the status of pornography in the criminal justice system.
This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security.
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection.
Researching an individual's, firm's or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement.
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures.
Good Manufacturing Practice (GMP) ensures medicinal products are produced consistently and controlled to the quality standards appropriate for their intended use and as required by product specifications or marketing authorization.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technolo
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether.
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.
Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations.
How-To Guide Written By Practicing ProfessionalsPhysical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner.
If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets.
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS).
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology.
Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications.
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks.
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "e;learn-by-doing"e; approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security.
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important.
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment.
Human-Computer Interaction (HCI) is a multidisciplinary research and applied field targeted to studying people interacting with information technology and designing usable and efficient systems for them.
"e;If I were giving out an award for 'book of the year' for internal audit professionals, I would certainly award it to her outstanding manuscript: Radical Reporting: Writing Better Audit, Risk, Compliance and Information Security Reports.
In the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous-it's imperative.