Skip to main content

Books in Security

  • Cybercrime and Business

    Strategies for Global Corporate Security
    • 1st Edition
    • May 19, 2017
    • Sanford Moskowitz
    • English
    Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately and then converged to form an ultra-dangerous composite threat, the book discusses the impact the threats pose and how the very technologies that created the problem can help solve it. Cybercrime and Business then offers viable strategies for how different types of businesses—from large multinationals to small start-ups—can respond to these threats to both minimize their losses and gain a competitive advantage. The book concludes by identifying future technological threats and how the models presented in the book can be applied to handling them.
  • Security Operations Center Guidebook

    A Practical Guide for a Successful SOC
    • 1st Edition
    • May 17, 2017
    • Gregory Jarpey + 1 more
    • English
    Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC. It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company’s SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.
  • Research Methods for Cyber Security

    • 1st Edition
    • April 19, 2017
    • Thomas W. Edgar + 1 more
    • English
    Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.
  • Digital Forensics Trial Graphics

    Teaching the Jury through Effective Use of Visuals
    • 1st Edition
    • March 9, 2017
    • John Sammons + 1 more
    • English
    Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technology that help anyone understand the complex concepts behind the science. Users will find invaluable information on theory and best practices along with guidance on how to design and deliver successful explanations.
  • Homeland Security

    The Essentials
    • 2nd Edition
    • February 4, 2017
    • George Haddow + 2 more
    • English
    Homeland Security: The Essentials, Second Edition concisely outlines the risks facing the US today and the structures we have put in place to deal with them. The authors expertly delineate the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters. From cyberwarfare, to devastating tornadoes, to car bombs, all hazards currently fall within the purview of the Department of Homeland Security, yet the federal role must be closely aligned with the work of partners in the private sector. The book lays a solid foundation for the study of present and future threats to our communities and to national security, also challenging readers to imagine more effective ways to manage these risks.
  • Integrating Emergency Management and Disaster Behavioral Health

    One Picture through Two Lenses
    • 1st Edition
    • January 18, 2017
    • Brian Flynn + 1 more
    • English
    Integrating Emergency Management and Disaster Behavioral Health identifies the most critical areas of integration between the profession of emergency management and the specialty of disaster behavioral health, providing perspectives from both of these critical areas, and also including very practical advice and examples on how to address key topics. Each chapter features primary text written by a subject matter expert from a related field that is accompanied by a comment by another profession that is then illustrated with a case study of, or a suggested method for, collaboration.
  • The Manager's Handbook for Corporate Security

    Establishing and Managing a Successful Assets Protection Program
    • 2nd Edition
    • January 18, 2017
    • Edward Halibozek + 1 more
    • English
    The Manager’s Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, Second Edition, guides readers through today’s dynamic security industry, covering the multifaceted functions of corporate security and providing managers with advice on how to grow not only their own careers, but also the careers of those they manage on a daily basis. This accessible, updated edition provides an implementation plan for establishing a corporate security program, especially for those who have little or no knowledge on the topic. It also includes information for intermediate and advanced professionals who are interested in learning more about general security, information systems security, and information warfare.
  • Sports Travel Security

    • 1st Edition
    • January 18, 2017
    • Peter Tarlow
    • English
    Sports Team Security examines the security needs for sports teams and events of all sizes. This groundbreaking book provides a fundamental model for sports team security that can be applied almost universally, from youth sports to the Super Bowl and World Cup. The book develops, compares, and contrasts current methodologies in sports security, for both amateur and professional athletes, examining which paradigms work best and under which circumstances. This valuable information is applicable to nearly anyone involved in the safety of athletes, including event managers, law enforcement, parents, school administrators and coaches, security practitioners, tourism industry professionals, and legal professionals. It explores areas rarely investigated, providing key advice for creating best practices and guidelines in sports team security.
  • Federal Cloud Computing

    The Definitive Guide for Cloud Service Providers
    • 2nd Edition
    • January 5, 2017
    • Matthew Metheny
    • English
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.
  • Terrorism and Homeland Security

    An Introduction with Applications
    • 2nd Edition
    • December 28, 2016
    • Philip Purpura + 1 more
    • English
    Terrorism and Homeland Security: An Introduction with Applications, Second Edition provides a comprehensive overview of terrorism, public and private sector counterterrorism and all hazards emergency management. The book presents national, state and local perspectives, and up-to-date information including the reorganization of the Department of Homeland Security, the renewed Patriot Act and intelligence reform.A wide range of issues are discussed, including such topics as the effectiveness of terrorism, weapons of mass destruction, the measurement of terrorism, victims of terrorism, privatization of counterterrorism, the code war, the merging of life safety and public safety, recent disasters, the role of the military, preemptive force, Homeland Security and national security versus due process models, pandemics and wars of globalization. The book emphasizes practical issues handled by senior government officials, private sector executives, security practitioners and a variety of first responders.