Skip to main content

Books in Security

91-100 of 613 results in All results

Security Supervision and Management

  • 4th Edition
  • June 9, 2015
  • IFPO
  • Sandi J. Davies + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 1 1 3 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 4 8 9 - 0
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today’s generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.

The Cloud Security Ecosystem

  • 1st Edition
  • June 1, 2015
  • Raymond Choo + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 5 9 5 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 7 8 0 - 7
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.

Introduction to Homeland Security

  • 5th Edition
  • May 29, 2015
  • George Haddow + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 5 6 - 2
Introduction to Homeland Security: Principles of All-Hazards Risk Management, Fifth Edition, provides users with a substantially updated version of previous versions, clearly delineating the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters, while also offering a balanced account of all aspects of homeland security. This new edition features coverage of the Boston Marathon bombing, analysis of the NIST Cybersecurity Framework for critical infrastructure protection, and examines the DHS “Blue Campaign” to stop human trafficking. To provide added perspective, this edition features additional “another voice” sections and examines the emergence of social media as a tool for reporting on homeland security issues.

Cyber-Physical Attacks

  • 1st Edition
  • May 21, 2015
  • George Loukas
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 2 9 0 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 4 6 3 - 9
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.

Securing SQL Server

  • 3rd Edition
  • April 23, 2015
  • Denny Cherry
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 2 7 5 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 3 7 5 - 5
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.

Keeping Religious Institutions Secure

  • 1st Edition
  • April 13, 2015
  • Jennie-Leigh McLamb
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 3 4 6 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 4 8 8 - 2
Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think about security and the types of breaches that can drive people away. The book focuses on the most frequent security concerns experienced by houses of worship, including embezzlement, vandalism, assault, hate crime, and in rare cases, an active shooter—and how to help prevent them from occurring. Beginning with an overview of the basic security concepts and principles that can enhance the security of any religious facility, it then delves deeply into the particular security concerns of houses of worship, including the use of volunteers, protecting religious leaders, ensuring safety for children and teens, interacting with local law enforcement, handling the media, and much more.

Hacking Web Intelligence

  • 1st Edition
  • April 13, 2015
  • Sudhanshu Chauhan + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 8 6 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 1 2 - 2
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.

Emergency Preparedness for Business Professionals

  • 1st Edition
  • April 11, 2015
  • Bradley A. Wayland
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 8 4 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 0 4 - 5
Emergency Response for Business Professionals provides business managers who do not have in-house security expertise as well as the security professionals who advise them with an overview on how to prepare and react to potential unexpected incidents that can occur to their organization. The book begins with an overview of the primary principles of business emergency planning, then delves into the considerations that an organization should take when developing their emergency plan. This includes the mitigation strategies for preventing the incident from occurring in the first place. It then shows how to identify and assess the risks the organization may realistically face, choose the commensurate security measures, and create the proper emergency response policies and procedures. The book explores how to respond in the event of an actual emergency, and how to recover business operations to full functionality after an incident occurs. Emergency Response for Business Professionals looks closely at the most common emergencies that pose concerns for many organizations, such as active shooters, unauthorized visitors, workplace violence, embezzlement, fraud, theft, natural and man-made disasters, major equipment malfunctions, sabotage, labor disputes, and loss of key personnel, among others, along with the appropriate and accepted responses used to respond to each type of incident. It covers methods for training employees in emergency response, and concludes with how to plan, prepare, and conduct emergency response exercises within the organization.

Security Technology Convergence Insights

  • 1st Edition
  • April 1, 2015
  • Ray Bernard
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 0 0 1 - 1
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management.

Corporate Security Management

  • 1st Edition
  • March 30, 2015
  • Marko Cabric
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 9 3 4 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 9 3 5 - 0
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted relationship into a successful and sustainable partnership. It combines security doctrine, business priorities, and best practices to uniquely answer the Who, What, Where, Why, When and How of corporate security. Corporate Security Management explores the diverse structures of security organizations in different industries. It shows the crucial corporate security competencies needed and demonstrates how they blend with the competencies of the entire organization. This book shows how to identify, understand, evaluate and anticipate the specific risks that threaten enterprises and how to design successful protection strategies against them. It guides readers in developing a systematic approach to assessing, analyzing, planning, quantifying, administrating, and measuring the security function.