Skip to main content

Books in Security

31-40 of 613 results in All results

Security Metrics Management

  • 2nd Edition
  • November 15, 2016
  • Gerald L. Kovacich + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 0 - 8
Security Metrics Management, Measuring the Effectiveness and Efficiency of a Security Program, Second Edition details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and workload, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. This fully updated guide is the go-to reference for managing an asset protection program and related security functions through the use of metrics. It supports the security professional’s position on budget matters, helping to justify the cost-effectiveness of security-related decisions to senior management and other key decision-makers. The book is designed to provide easy-to-follow guidance, allowing security professionals to confidently measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, build budgets, and provide trend analyses to develop a more efficient and effective asset protection program.

Effective Physical Security

  • 5th Edition
  • November 14, 2016
  • Lawrence J. Fennelly
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 6 2 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 9 5 - 7
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author’s work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.

Lossless Information Hiding in Images

  • 1st Edition
  • November 11, 2016
  • Zhe-Ming Lu + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 2 0 0 6 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 2 1 6 6 - 5
Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding. Lossless information hiding is a technique that enables images to be authenticated and then restored to their original forms by removing the watermark and replacing overridden images. This book focuses on the lossless information hiding in our most popular media, images, classifying them in three categories, i.e., spatial domain based, transform domain based, and compressed domain based. Furthermore, the compressed domain based methods are classified into VQ based, BTC based, and JPEG/JPEG2000 based.

Physical Security: 150 Things You Should Know

  • 2nd Edition
  • October 27, 2016
  • Lawrence J. Fennelly + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 4 8 7 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 5 1 0 - 2
Physical Security: 150 Things You Should Know, Second Edition is a useful reference for those at any stage of their security career. This practical guide covers the latest technological trends for managing the physical security needs of buildings and campuses of all sizes. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on physical security available. Security practitioners of all levels will find this book easy to use as they look for practical tips to understand and manage the latest physical security technologies, such as biometrics, IP video, video analytics, and mass notification, as well as the latest principles in access control, command and control, perimeter protection, and visitor management.

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

  • 1st Edition
  • October 12, 2016
  • Kim-Kwang Raymond Choo + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 3 0 3 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 4 4 8 - 2
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges.

Building a Practical Information Security Program

  • 1st Edition
  • October 3, 2016
  • Jason Andress + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 4 2 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 8 8 - 3
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

Handbook of System Safety and Security

  • 1st Edition
  • October 2, 2016
  • Edward Griffor
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 3 7 7 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 3 8 - 3
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance.

Integrating Python with Leading Computer Forensics Platforms

  • 1st Edition
  • September 21, 2016
  • Chet Hosmer
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 9 4 9 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 9 5 0 - 6
Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCase by Guidance Software, MPE+ by AccessData, The Open Source Autopsy/SleuthKit by Brian Carrier and WetStone Technologies, and Live Acquisition and Triage Tool US-LATT. This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime. Additionally, the open source availability of the examples allows for sharing and growth within the industry. This book is the first to provide details on how to directly integrate Python into key forensic platforms.

Penetration Tester's Open Source Toolkit

  • 4th Edition
  • September 20, 2016
  • Jeremy Faircloth
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 1 4 9 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 5 3 - 2
Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.

Mobile Security and Privacy

  • 1st Edition
  • September 13, 2016
  • Man Ho Au + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 6 2 9 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 7 4 6 - 0
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.