The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices.
In a world increasingly driven by technology, this book explores the intersection of artificial intelligence (AI), IoT, and Cloud Computing and women's safety, highlighting the transformative potential of technology in safeguarding women's well-being in the physical and the digital world.
This book provides a comprehensive guide to procuring, utilizing and monetizing intellectual property rights, tailored for readers in the high-tech consumer electronics and software industries, as well as technology startups.
This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast ocean of publicly available information to gain valuable insights and intelligence.
Pervasive and ubiquitous, machine translation systems have been transforming communication and understanding across languages and cultures on a historical scale.
On the back of their last book, Cyber-risk and Youth, and building on a new research project, Adorjan and Ricciardelli marshal current research to explore parenting in the digital age.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
The fourth industrial revolution challenges humanity ethically and morally: mass unemployment, new forms of colonialism, and mass-and-granular surveillance are a few examples of these challenges.
This book focuses on the global landscape in which insurance is transacted, and where it is evolving, driven from within by transformative technologies and externally by the necessity to address risks like climate change and health crises, such as the COVID-19 pandemic.
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective.
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis.
Approximately 80 percent of the worlds population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime.
This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is being taken for China's growth and development.
Global criminology is an emerging field covering international and transnational crimes that have not traditionally been the focus of mainstream criminology or criminal justice.
Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards.
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers.
This book proposes a global and systemic multidimensional integrated approach to the holistic evaluation of the information security posture of an organization.
This book provides business managers, IT professionals, and students with an integrated approach to designing, developing, and sustaining an effective data governance strategy.
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security.
The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization.
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered.
From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry.
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security.
Detailing a comprehensive set of requirements for secure and resilient software development and operation, this book supplies documented test cases for those requirements and best practices for testing nonfunctional requirements.
Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions.