The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process.
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea.
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject.
Forensic Perspectives on Cybercrime is the first book to combine the disciplines of cyberpsychology and forensic psychology, helping to define this emergent area.
Distributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed over time, and therefore who controls, has access to, and is responsible for its authenticity.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
The Audit Value Factor: Making Management's Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization.
The Audit Value Factor: Making Management's Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization.
Artificial Intelligence (AI) innovations in digital health offer unprecedented opportunities to facilitate human health and provide tools and techniques that reduce overall costs.
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization.
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management.
Sport Cyberpsychology is the first book devoted to assessing the influence of technology on human interaction, behaviour and mental health in a sport context, gathering research on the use of technology and the Internet by athletes, coaches and sport science support staff.
Sport Cyberpsychology is the first book devoted to assessing the influence of technology on human interaction, behaviour and mental health in a sport context, gathering research on the use of technology and the Internet by athletes, coaches and sport science support staff.
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered.
Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems.
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity.
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity.
Cybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation.