The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and...
Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security...
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one...
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge...
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical...
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns...
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety...
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices...