Exploring the challenges, issues, and dilemmas of managing information security risk, this volume introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-ti..
Detailing a comprehensive set of requirements for secure and resilient software development and operation, this book supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements. It offers ground-level, already-developed software nonfunctiona..
Many of the software books available clearly highlight the problems with current software development but don't provide comprehensive, easily actionable, ground-level solutions. Covering the entire secure software development life cycle that ties all development together, this book presents quality ..
Demonstrates techniques for strengthening network security. The book provides an introduction to Cisco technology and the TCP/IP protocol suite, and covers subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA)...
A practitioners' handbook on securing virtualization, cloud computing, and mobility, this book bridges academic theory with real world implementation. It provides pragmatic guidance on securing the multi-faceted layers of private and public cloud deployments as well as mobility infrastructures. The ..
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This book..
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the I..
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it also has attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts f..
A versatile reference, this book details state-of-the-art approaches and novel technologies for communication networks and security in smart grids. It examines contemporary grid security and discusses how it is being developed and deployed. The chapters cover direct attacks and smart meters, as well..
This book introduces new cross-layer design approaches for wireless sensor networks using identity-based cryptography. It starts with a review of the existing layered approach and then examines new attack vectors that exploit the layered approach to security. After providing the necessary background..
This book is written for the security manager who wants to be a more effective manager, as well as for students who would like to become security managers. It provides a methodical process to look at the security management functions so they can better tailor security to any organization. The book p..
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and atte..