Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security...
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one...
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or...
Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of...
This book provides digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities...
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and...
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during...