Skip to main content

Books in Security

51-60 of 613 results in All results

Data Breach Preparation and Response

  • 1st Edition
  • June 8, 2016
  • Kevvie Fowler
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 4 5 1 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 4 5 0 - 7
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Cybersecurity and Applied Mathematics

  • 1st Edition
  • June 7, 2016
  • Leigh Metcalf + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 2 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 9 9 - 5
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

Insider Threat

  • 1st Edition
  • May 26, 2016
  • Michael G. Gelles
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 4 1 0 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 2 2 - 9
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former employees. This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization’s critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.

Threat Forecasting

  • 1st Edition
  • May 17, 2016
  • John Pirc + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 0 0 6 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 4 7 8 - 4
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

OS X Incident Response

  • 1st Edition
  • May 6, 2016
  • Jaron Bradley
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 6 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 3 - 9
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating many crimes but businesses are recognizing the importance of having skilled forensic investigators on staff in the case of policy violations. Perhaps more importantly, though, businesses are seeing enormous impact from malware outbreaks as well as data breaches. The skills of a forensic investigator are critical to determine the source of the attack as well as the impact. While there is a lot of focus on Windows because it is the predominant desktop operating system, there are currently very few resources available for forensic investigators on how to investigate attacks, gather evidence and respond to incidents involving OS X. The number of Macs on enterprise networks is rapidly increasing, especially with the growing prevalence of BYOD, including iPads and iPhones. Author Jaron Bradley covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. Instead of using expensive commercial tools that clone the hard drive, you will learn how to write your own Python and bash-based response scripts. These scripts and methodologies can be used to collect and analyze volatile data immediately.   For online source codes, please visit: https://github.com/jbradley89/osx_incident_response_scripting_and_analysis

Protecting Patient Information

  • 1st Edition
  • April 7, 2016
  • Paul Cerrato
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 3 9 2 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 1 1 - 7
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes. Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization’s information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, the book outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.

Building a Travel Risk Management Program

  • 1st Edition
  • March 31, 2016
  • Charles Brossman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 9 2 5 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 3 8 - 2
Building a Travel Risk Management Program: Traveler Safety and Duty of Care for Any Organization helps business and security professionals effectively manage traveler risk by showing them how to build a complete travel risk program. While global corporate travel risks are increasing exponentially, many security and business managers are not well-versed in the rapidly changing global landscape of travel risk, nor do they fully realize the multitude of risks their companies face if they don’t comply with their legal obligations—“duty of care"—for protecting their employees from foreseeable harm, which can cost a company in the form of extensive fines, productivity loss, business interruptions, stock price loss, litigation, and even potential bankruptcy. This book is the first to bridge the gap between the topics of travel management, security, and risk management. It serves as a reference point for working with other departments, including human resources and legal, paving the way for better internal cooperation for travel managers and security managers. In addition, it helps organizations craft a travel risk management program for their unique needs that incorporates the most important policies and procedures that help them comply with legal obligations.

Maritime Security

  • 2nd Edition
  • March 19, 2016
  • Michael McNicholas
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 6 7 2 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 7 3 - 0
Maritime Security: An Introduction, Second Edition, provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports. New chapters focus on whole government maritime security, UN legal conventions and frameworks, transnational crime, and migration. Updates throughout will provide the latest information in increasingly important field.

Network Performance and Security

  • 1st Edition
  • March 9, 2016
  • Chris Chapman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 5 8 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 0 1 - 3
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory.   The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.   Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.

Windows Registry Forensics

  • 2nd Edition
  • March 3, 2016
  • Harlan Carvey
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 2 9 1 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 3 3 5 - 7
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.