Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security...
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one...
PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on...
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure...
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and...
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during...
Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods...