Skip to main content

Books in Security

11-20 of 613 results in All results

Security Controls Evaluation, Testing, and Assessment Handbook

  • 2nd Edition
  • November 21, 2019
  • Leighton Johnson
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 8 4 2 7 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 2 0 6 2 4 - 9
Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.

Smart Cities Cybersecurity and Privacy

  • 1st Edition
  • December 4, 2018
  • Danda B. Rawat + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 5 0 3 2 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 5 0 3 3 - 7
Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city’s physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications.

Security and Loss Prevention

  • 7th Edition
  • August 8, 2018
  • Philip Purpura
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 1 7 9 5 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 7 9 6 - 5
Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor’s manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.

Seeking the Truth from Mobile Evidence

  • 1st Edition
  • November 13, 2017
  • John Bair
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 1 0 5 6 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 0 5 7 - 7
Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing advanced destructive techniques. This book is intended for any professional that is interested in pursuing work that involves mobile forensics, and is designed around the outcomes of criminal investigations that involve mobile digital evidence. Author John Bair brings to life the techniques and concepts that can assist those in the private or corporate sector. Mobile devices have always been very dynamic in nature. They have also become an integral part of our lives, and often times, a digital representation of where we are, who we communicate with and what we document around us. Because they constantly change features, allow user enabled security, and or encryption, those employed with extracting user data are often overwhelmed with the process. This book presents a complete guide to mobile device forensics, written in an easy to understand format.

Ambulatory Surgery Center Safety Guidebook

  • 1st Edition
  • September 20, 2017
  • Dale Lyman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 4 9 8 8 9 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 8 7 - 2
Ambulatory Surgery Center Safety Guidebook: Managing Code Requirements for Fire and Life Safety helps guide ASC administrative and security staff meet the requirements and standards of both federal and state authorities, including the Life Safety Code, a critical designation for facilities participating in Medicare (CMS) funding reimbursement. Designed for easy reference, the book assumes no code knowledge on the part of ASC staff, and provides guidance for the policies, emergency plans, drills, inspection, testing and maintenance of fire protection and building systems necessary for meeting Life Safety Code requirements. Through sample checklists and log sheets, and a systematic process for completing required documentation, the reader is directed through the crucial steps to achieving code compliance. The guide provides ASC staff the knowledge necessary to be in compliance with the Life Safety Code without the need for an outside security or safety consultant. Through this compliance, facilities remain licensed and qualified for Medicare reimbursement, ultimately improving the financial success of the ASC.

Deception in the Digital Age

  • 1st Edition
  • June 23, 2017
  • Cameron H. Malin + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 6 3 0 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 6 3 9 - 9
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

Cell Phone Location Evidence for Legal Professionals

  • 1st Edition
  • June 12, 2017
  • Larry Daniel
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 3 9 7 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 3 8 2 - 5
Cell Phone Location Evidence for Legal Professionals: Understanding Cell Phone Location Evidence from the Warrant to the Courtroom is a guide, in plain language, for digital forensics professionals, attorneys, law enforcement professionals and students interested in the sources, methods and evidence used to perform forensic data analysis of cell phones, call detail records, real time ping records and geo-location data obtained from cellular carriers and cell phones. Users will gain knowledge on how to identify evidence and how to properly address it for specific cases, including challenges to the methods of analysis and to the qualifications of persons who would testify about this evidence. This book is intended to provide digital forensics professionals, legal professionals and others with an interest in this field the information needed to understand what each type of evidence means, where it comes from, how it is analyzed and presented, and how it is used in various types of civil and criminal litigation. Relevant case law are included, or referred to, as appropriate throughout this book to give the reader an understanding of the legal history of this type of evidence and how it is being addressed by various state and federal courts.

From Corporate Security to Commercial Force

  • 1st Edition
  • May 23, 2017
  • Marko Cabric
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 4 9 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 5 0 - 4
From Corporate Security to Commercial Force: A Business Leader’s Guide to Security Economics addresses important issues, such as understanding security related costs, the financial advantages of security, running an efficient security organization, and measuring the impact of incidents and losses. The book guides readers in identifying, understanding, quantifying, and measuring the direct and economic benefits of security for a business, its processes, products, and consequently, profits. It quantifies the security function and explains the never-before analyzed tangible advantages of security for core business processes. Topics go far beyond simply proving that security is an expense for a company by providing business leaders and sales and marketing professionals with actual tools that can be used for advertising products, improving core services, generating sales, and increasing profits.

Cybercrime and Business

  • 1st Edition
  • May 19, 2017
  • Sanford Moskowitz
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 0 3 5 3 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 3 8 8 - 6
Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately and then converged to form an ultra-dangerous composite threat, the book discusses the impact the threats pose and how the very technologies that created the problem can help solve it. Cybercrime and Business then offers viable strategies for how different types of businesses—from large multinationals to small start-ups—can respond to these threats to both minimize their losses and gain a competitive advantage. The book concludes by identifying future technological threats and how the models presented in the book can be applied to handling them.

Security Operations Center Guidebook

  • 1st Edition
  • May 17, 2017
  • Gregory Jarpey + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 6 5 7 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 8 2 - 2
Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC.  It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company’s SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.