Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process.
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios.
Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions.
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field.
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes.
Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver.
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers.
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack.
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence.
The Certified Information Security Manager(CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA).
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process.
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea.
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject.
Forensic Perspectives on Cybercrime is the first book to combine the disciplines of cyberpsychology and forensic psychology, helping to define this emergent area.
Distributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed over time, and therefore who controls, has access to, and is responsible for its authenticity.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
The Audit Value Factor: Making Management's Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization.
The Audit Value Factor: Making Management's Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization.
Artificial Intelligence (AI) innovations in digital health offer unprecedented opportunities to facilitate human health and provide tools and techniques that reduce overall costs.
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization.
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management.