Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security...
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one...
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and...
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to...
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or...
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of...
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of...