Skip to main content

Books in Security

21-30 of 613 results in All results

Research Methods for Cyber Security

  • 1st Edition
  • April 19, 2017
  • Thomas W. Edgar + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 3 4 9 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 2 9 3 0 - 2
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Digital Forensics Trial Graphics

  • 1st Edition
  • March 9, 2017
  • John Sammons + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 4 8 3 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 4 9 3 - 4
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technology that help anyone understand the complex concepts behind the science. Users will find invaluable information on theory and best practices along with guidance on how to design and deliver successful explanations.

Homeland Security

  • 2nd Edition
  • February 4, 2017
  • George Haddow + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 6 5 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 1 0 - 7
Homeland Security: The Essentials, Second Edition concisely outlines the risks facing the US today and the structures we have put in place to deal with them. The authors expertly delineate the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters. From cyberwarfare, to devastating tornadoes, to car bombs, all hazards currently fall within the purview of the Department of Homeland Security, yet the federal role must be closely aligned with the work of partners in the private sector. The book lays a solid foundation for the study of present and future threats to our communities and to national security, also challenging readers to imagine more effective ways to manage these risks.

Integrating Emergency Management and Disaster Behavioral Health

  • 1st Edition
  • January 18, 2017
  • Brian Flynn + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 6 3 8 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 3 9 - 6
Integrating Emergency Management and Disaster Behavioral Health identifies the most critical areas of integration between the profession of emergency management and the specialty of disaster behavioral health, providing perspectives from both of these critical areas, and also including very practical advice and examples on how to address key topics. Each chapter features primary text written by a subject matter expert from a related field that is accompanied by a comment by another profession that is then illustrated with a case study of, or a suggested method for, collaboration.

The Manager's Handbook for Corporate Security

  • 2nd Edition
  • January 18, 2017
  • Edward Halibozek + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 6 0 4 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 6 1 3 - 5
The Manager’s Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, Second Edition, guides readers through today’s dynamic security industry, covering the multifaceted functions of corporate security and providing managers with advice on how to grow not only their own careers, but also the careers of those they manage on a daily basis. This accessible, updated edition provides an implementation plan for establishing a corporate security program, especially for those who have little or no knowledge on the topic. It also includes information for intermediate and advanced professionals who are interested in learning more about general security, information systems security, and information warfare.

Sports Travel Security

  • 1st Edition
  • January 18, 2017
  • Peter Tarlow
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 0 9 9 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 0 0 - 9
Sports Team Security examines the security needs for sports teams and events of all sizes. This groundbreaking book provides a fundamental model for sports team security that can be applied almost universally, from youth sports to the Super Bowl and World Cup. The book develops, compares, and contrasts current methodologies in sports security, for both amateur and professional athletes, examining which paradigms work best and under which circumstances. This valuable information is applicable to nearly anyone involved in the safety of athletes, including event managers, law enforcement, parents, school administrators and coaches, security practitioners, tourism industry professionals, and legal professionals. It explores areas rarely investigated, providing key advice for creating best practices and guidelines in sports team security.

Federal Cloud Computing

  • 2nd Edition
  • January 5, 2017
  • Matthew Metheny
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 7 1 0 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 6 8 7 - 1
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.

Terrorism and Homeland Security

  • 2nd Edition
  • December 28, 2016
  • Philip Purpura + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 7 0 - 3
Terrorism and Homeland Security: An Introduction with Applications, Second Edition provides a comprehensive overview of terrorism, public and private sector counterterrorism and all hazards emergency management. The book presents national, state and local perspectives, and up-to-date information including the reorganization of the Department of Homeland Security, the renewed Patriot Act and intelligence reform.A wide range of issues are discussed, including such topics as the effectiveness of terrorism, weapons of mass destruction, the measurement of terrorism, victims of terrorism, privatization of counterterrorism, the code war, the merging of life safety and public safety, recent disasters, the role of the military, preemptive force, Homeland Security and national security versus due process models, pandemics and wars of globalization. The book emphasizes practical issues handled by senior government officials, private sector executives, security practitioners and a variety of first responders.

Certifiable Software Applications 2

  • 1st Edition
  • November 28, 2016
  • Jean-Louis Boulanger
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 1 1 8 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 1 1 6 4 - 5
Certifiable Software Applications 2: Support Processes explains the process to achieve a certifiable application. This concerns several major topics, skill management, data preparation, requirement management, software verification, and software validation. In addition, analysis of the impact of the use of COTS and pre-existing software on certifiable software is presented. Finally, the last support process concerns the management of commercial tools, the creation of a specific tools, and therefore the qualification of tools, which is based on their impact on the final software.

Advanced Persistent Security

  • 1st Edition
  • November 22, 2016
  • Ira Winkler + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 3 1 6 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 3 6 5 - 8
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.