Books

20+ results found
Title Authors Description OpenBook ID
Assessing and managing security risk in IT systems Assessing and managing security risk in IT systems John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… OL13638173W
Information communication technology law, protection, and access rights Information communication technology law, protection, and access rights Irene Maria Portela "This book identifies key issues in the relationship between ICT and law, ethics, politics and social policy, drawing attention to diverse global approaches to the challenges posed by ICT to access r… OL15508218W
Auditing cloud computing Auditing cloud computing Ben Halpert "The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of … OL16014206W
Protecting Your Health Privacy Protecting Your Health Privacy Jacqueline Klosek Protecting Your Health Privacy empowers ordinary citizens with the legal and technological knowledge and know-how we need to protect ourselves and our families from prying corporate eyes, medical ide… OL16465587W
Collaborative computer security and trust management Collaborative computer security and trust management Jean-Marc Seigneur "This book combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field"--Provided by publisher. OL16936264W
Privacy in the Age of Big Data Privacy in the Age of Big Data Theresa M. Payton,Theodore Claypoole Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to ge… OL17047064W
Privacy in the age of big data Privacy in the age of big data Theresa Payton Highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. OL19671007W
Data Privacy Management and Autonomous Spontaneous Security Data Privacy Management and Autonomous Spontaneous Security Roberto Pietro This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… OL19840128W
Information Security Practice and Experience Information Security Practice and Experience Robert H. Deng This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised ful… OL19857516W
Information Security Applications Information Security Applications Dong Hoon Lee This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.… OL19857525W
IT-Sicherheit mit System IT-Sicherheit mit System Klaus-Rainer Müller Prof. Damian Weber, Saarbrücken, empfiehlt dieses Buch seinen Studenten, "weil es eines der wenigen Bücher zur Sicherheit ist, das gut strukturiert ist." Wegweisendes Handlungswissen, um IT-Prozesse … OL19877462W
Protocols for Authentication and Key Establishment Protocols for Authentication and Key Establishment Colin Boyd Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities o… OL19897610W
Research Directions in Data and Applications Security Research Directions in Data and Applications Security Ehud Gudes Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems an… OL19899673W
Secure IT Systems Secure IT Systems Audun Jøsang This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully revi… OL19901254W
Security of Data and Transaction Processing Security of Data and Transaction Processing Vijay Atluri <Em>Security of Data and Transaction Processing</em> brings together in one place important contributions and up-to-date research results in this fast moving area. <br/> <em>Security of Data and Tran… OL19901265W
Security and Privacy in Communication Networks Security and Privacy in Communication Networks Angelos D. Keromytis This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The… OL19901284W
Security and Trust Management Security and Trust Management Audun Jøsang This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in con… OL19901295W
Smart Grid Security Smart Grid Security Jorge Cuellar The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirement… OL19902432W
Privacy at Risk Privacy at Risk Christopher Slobogin,Christopher Slobogin Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other… OL2033368W
Invasion of privacy Invasion of privacy Louis R. Mizell A former intelligence officer and president of an international security group, shares up to the minute strategies for safeguarding your privacy. Although no measure of protection is foolproof, this … OL2227034W
Next page