Skip to main content

Books in Security

61-70 of 613 results in All results

Implementing Digital Forensic Readiness

  • 1st Edition
  • February 26, 2016
  • Jason Sachowski
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 4 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 1 - 5
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.

Building a Corporate Culture of Security

  • 1st Edition
  • February 24, 2016
  • John Sullivant
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 1 9 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 5 8 - 6
Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management. Presented from the viewpoint of a leading expert in the field, the book offers proven and integrated strategies that convert threats, hazards, risks, and vulnerabilities into actionable security solutions, thus enhancing organizational resiliency in ways that executive management will accept. The book delivers a much-needed look into why some corporate security practices programs work and others don’t. Offering the tools necessary for anyone in the organization charged with security operations, Building a Corporate Culture of Security provides practical and useful guidance on handling security issues corporate executives hesitate to address until it’s too late.

Alarm Systems and Theft Prevention

  • 2nd Edition
  • February 17, 2016
  • Thad L. Weber
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 6 0 8 7 - 0
Alarm Systems and Theft Prevention, Second Edition, recounts the sometimes sad, sometimes humorous, and nearly always unfortunate experiences of manufacturers, distributors, retailers, and individuals who have lost valuable merchandise, money, jewelry, or securities to criminal attacks. In most cases the losses occurred because there was a weak link: a vulnerability in the total security defense. The book presents in practical terms those weaknesses in physical security, alarm systems, or related security procedures that, when blended together, result in vulnerability. In addition to analyzing these cases and identifying the key elements of vulnerability, remedies for curing the weakness are also offered. Other sections of this book deal with the application, strengths, and limitations of security equipment. For the most part, equipment is presented from the practical viewpoint—what a security device or system will do (or not do) and how it should be applied and operated, rather than the detail of mechanical design, electrical circuitry, or laboratory theories. This book is written in layman's language and is intended to be read by people who supply, use, or need security services and equipment.

Biosecurity and Bioterrorism

  • 2nd Edition
  • February 12, 2016
  • Jeffrey Ryan
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 2 9 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 5 7 - 9
Biosecurity and Bioterrorism, Second Edition, takes a holistic approach to biosecurity, with coverage of pathogens, prevention, and response methodology. It addresses these hazards in the context of vulnerability assessments and the planning strategies government and industry can use to prepare for and respond to such events. The book is organized into four thematic sections: Part I provides a conceptual understanding of biowarfare, bioterrorism and the laws we have to counteract this; Part II investigates known bioagents and the threat from emerging diseases; Part III focuses on agricultural terrorism and food security; and Part IV outlines international, US, and local initiatives for biodefense and biosecurity. Case studies illustrate biodefense against both intentional terrorism and natural outbreaks.

The Information Systems Security Officer's Guide

  • 3rd Edition
  • January 12, 2016
  • Gerald L. Kovacich
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 1 9 0 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 7 9 - 2
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

  • 1st Edition
  • December 10, 2015
  • Henry Dalziel + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 0 5 - 4
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

Essential Skills for Hackers

  • 1st Edition
  • December 9, 2015
  • Kevin Cardwell + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 1 1 - 5
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Security Controls Evaluation, Testing, and Assessment Handbook

  • 1st Edition
  • December 7, 2015
  • Leighton Johnson
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 2 4 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 5 6 4 - 2
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

Digital Forensics

  • 1st Edition
  • December 7, 2015
  • John Sammons
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 5 2 6 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 4 2 - 8
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.

Breaking into Information Security

  • 1st Edition
  • December 5, 2015
  • Josh More + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 8 3 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 9 8 9 - 5
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.