This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
This volume introduces Nostega—a novel noiseless steganography paradigm. Rather than hiding data in noise or producing noise, Nostega camouflages mess..
This annually updated handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required by IT security professional..
This book analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. I..
Information security is everyone's concern. The functioning of our business organizations, the management of our supply chains, and the operation of o..
Discusses the role of information systems in emergency response and preparedness. This book covers various phases of disaster management - mitigation,..
A reference and self-study guide, this book takes readers step-by-step through developing, distributing, and monitoring an information security awaren..
This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy t..
Providing the mechanics for policy, procedure, and standards development, Information Security Policies, Procedures, and Standards: Guidelines for Eff..
A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains..
Managing A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps ..
This book is a test prep book to help you pass the test. It discusses successful approaches for the exam, provides sample questions and test-taking ti..