Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the atta..
A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, governm..
This book showcases the technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional biometric techniques as well as novel systems developed over the past ..
Securing social networks and ensuring the privacy of participants has become a crucial need. There are no books to date that address both social network analytics as well as security and privacy. Filling this need, this book discusses concepts, techniques, and tools for analyzing and securing social..
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information..
The most comprehensive resource on the subject, Asset Protection and Security Management Handbook is a must for all professionals involved in security and security management. For people new to the security profession, it gives a firm foundation for advanced development. For experienced security pra..
USAF Lieutenant Colonel Kathleen Sweet’s seminal resource is considered the definitive handbook on the terrorist threat to commercial airline and airport security. Presenting an analysis of modern day risks, it covers the history of aviation security and compares current in-flight security practices..
Antivirus software uses algorithms to detect viruses Reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud framework, and the ..
Suitable for those interested in the construction and operation of an information assurance (IA) program, this book describes the key building blocks of an IA development effort. It presents the authors' own proprietary process based on the systems development life cycle (SDLC) methodology specifica..
A reference and self-study guide, this book takes readers step-by-step through developing, distributing, and monitoring an information security awareness program. It includes instructions on communicating the message and describes how to efficiently use outside sources to optimize the impact of a sm..
Takes readers through developing, distributing, and monitoring an information security awareness program. This book includes instructions on communicating the message and describes how to efficiently use outside sources to optimize the impact of a small staff...
This edited book provides an accessible introduction to the field of intelligent systems. Capturing the state of the art in intelligent computing research, it contains numerous case studies that examine recent developments, developmental tools, programming, and approaches related to artificial intel..