Skip to main content

Books in Security

101-110 of 613 results in All results

Measuring and Communicating Security's Value

  • 1st Edition
  • March 28, 2015
  • George Campbell
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 8 4 3 - 8
In corporate security today, while the topic of information technology (IT) security metrics has been extensively covered, there are too few knowledgeable contributions to the significantly larger field of global enterprise protection. Measuring and Communicating Security’s Value addresses this dearth of information by offering a collection of lessons learned and proven approaches to enterprise security management. Authored by George Campbell, emeritus faculty of the Security Executive Council and former chief security officer of Fidelity Investments, this book can be used in conjunction with Measures and Metrics in Corporate Security, the foundational text for security metrics. This book builds on that foundation and covers the why, what, and how of a security metrics program, risk reporting, insider risk, building influence, business alignment, and much more.

Digital Identity Management

  • 1st Edition
  • March 24, 2015
  • Maryline Laurent + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 5 9 1 - 0
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place.

Business Espionage

  • 1st Edition
  • March 18, 2015
  • Bruce Wimmer CPP
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 0 5 4 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 0 5 9 - 3
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage.

Introduction to Social Media Investigation

  • 1st Edition
  • March 13, 2015
  • Jennifer Golbeck
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 6 5 6 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 8 0 2 - 6
If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques.

Hospital and Healthcare Security

  • 6th Edition
  • February 19, 2015
  • Tony W York + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 4 2 0 0 4 8 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 0 6 2 - 3
Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management. The recognized leading text in the healthcare security industry, Hospital and Healthcare Security, 6th Edition explains the basics as well as higher expertise concerns, such as the roles of design, emergency management, and policy. Conveying a wide spectrum of topics in an easy to comprehend format, Hospital and Healthcare Security, 6th Edition provides a fresh perspective for healthcare security professionals to better prepare for security issue before they occur.

Application of Big Data for National Security

  • 1st Edition
  • February 14, 2015
  • Babak Akhgar + 5 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 9 6 7 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 7 3 - 3
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security

Protecting Transportation

  • 1st Edition
  • January 28, 2015
  • R William Johnstone
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 8 1 0 1 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 9 2 8 - 1
Protecting Transportation: Implementing Security Policies and Programs provides a thorough overview of transportation security in the United States, with a focus on policy. The book coversall major transportation modes and puts the American security system into perspective against other national and international systems. Author R. William Johnstone, a transportation security expert and member of the 9/11 Commission staff, discusses how the current transportation security system came to be and how it is performing. Whether you are a current or aspiring transportation security professional, a policymaker, or an engaged citizen, Johnstone’s presentation equips you to understand today’s issues and debates on a problem that affects every member of the global community. Transportation security has evolved in the years since 9/11 from a relatively modest, sporadic undertaking into a multi-billion dollar enterprise employing tens of thousands. Protecting Transportation describes how that system is organized, funded, and implemented.

Environmental and Animal Rights Extremism, Terrorism, and National Security

  • 1st Edition
  • January 23, 2015
  • Elzbieta Posluszna
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 4 7 8 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 7 0 4 - 3
As concerns about human treatment of the environment and animals have increased over the years, so have decentralized and extremist groups related to these causes. Environmental and Animal Rights Extremism, Terrorism, and National Security analyzes the international development of radical movements relating to environmental concerns and animal rights in the context of the threats they pose to national security. In addition to tracing the factors responsible for the rapid growth of these movements over the last 25 years, this text presents countermeasures that governments can deploy to neutralize the risk posed by these threats now and in the future. Bringing to bear new developments such as cyber activity and online activism, Environmental and Animal Rights Extremism, Terrorism, and National Security offers an examination of the direct and indirect violence, lone-wolf terrorism, and leaderless resistance that have characterized these radical wings from their inception.By not only identifying the tactics and organizational structures often employed by these groups, but also addressing future trends toward increased radicalization, Environmental and Animal Rights Extremism, Terrorism, and National Security is an important resource for identifying, anticipating, and mitigating threats posed by such movements.

The Process of Investigation

  • 4th Edition
  • December 30, 2014
  • Charles A. Sennewald + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 0 1 6 6 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 6 4 3 - 6
The Process of Investigation, Fourth Edition addresses the needs of today’s private sector investigative professional by providing a full-spectrum treatment of the investigative process, from case inception and investigative strategy selection to executing complex investigative techniques, to creating reports useful for corporate, legal, and prosecutorial purposes.Continuing in the tradition of its previous editions, The Process of Investigation, Fourth Edition covers essential topics overlooked in books on the public aspects of investigation. Investigative skills such as surveillance techniques, interviewing and interrogation, collecting and documenting evidence, and taking confessions and written statements are all discussed, and supplemented with updated case studies and examples from the authors’ own professional experiences.

HCISPP Study Guide

  • 1st Edition
  • December 10, 2014
  • Timothy Virtue + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 4 3 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 8 9 - 0
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.