From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry.
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals.
As the twelfth most populous nation, the Philippines' diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security-post 9/11.
In today's increasingly litigious society, the threat of a private investigator (PI) being hit with a civil lawsuit or even criminal charges is very real.
Detailing procedures that will help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management and information security.
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively cover Game SteganographyAlthough the goal of steganography is to prevent adversaries from suspe
A reference for law enforcement and security organizations tasked with protecting the welfare of an individual or groups of individuals, this volume offers suggestions and guidance for confronting high-threat scenarios as well as the more mundane protective details.
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity.
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
From Main Street to Mumbai, Managing Emerging Risk: The Capstone of Preparedness considers the new global drivers behind threats and hazards facing all those tasked with protecting the public and private sector.
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies.
In today's increasingly litigious society, the threat of a private investigator (PI) being hit with a civil lawsuit or even criminal charges is very real.
From the streets of London to subway stations in New York City, hundreds of thousands of surveillance cameras ubiquitously collect hundreds of thousands of videos, often running 24/7.
The analytical power of ion mobility spectrometry-mass spectrometry (IMS-MS) instruments is poised to advance this technology from research to analytical laboratories.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
As the twelfth most populous nation, the Philippines' diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security-post 9/11.
Guru to a new generation of chefs from Chicago to Copenhagen, Spain's Ferran Adri,as been featured on Time magazine's list of the 100 most influential people of our times and touted by the press as an alchemist and a genius.
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI-recognized subject matter expert, this text details the recommended protocol for protecting people and assets in hostile global settings.
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack.
This textbook examines fashion luxury brand management, providing students with a comprehensive understanding of its origins, unique components, current practices, global trade and, most importantly, the application of sustainable models to the industry.
Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals.
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs.
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
The enormous sums paid for the release of hostages coupled with law enforcement's inability to stem the tide has made kidnapping for ransom a worldwide plague.
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
If you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate?
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks.
Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space.
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios.
The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention.
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.