Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security...
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one...
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques...
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business...
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way...
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible...
This book provides digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities...