Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure...
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of...
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of...
Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods...
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns...
The new edition of CCTV, a high-level professional reference, is expanded to cover all video compression techniques used in the ever-increasing...
Closed Circuit Television (CCTV) surveillance is one of the fastest growing areas in the security industry. This book is an essential guide for...
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one...
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business...
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and...