|
Assessing and managing security risk in IT systems
|
John McCumber |
Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… |
OL13638173W |
|
Information communication technology law, protection, and access rights
|
Irene Maria Portela |
"This book identifies key issues in the relationship between ICT and law, ethics, politics and social policy, drawing attention to diverse global approaches to the challenges posed by ICT to access r… |
OL15508218W |
|
Auditing cloud computing
|
Ben Halpert |
"The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of … |
OL16014206W |
|
Protecting Your Health Privacy
|
Jacqueline Klosek |
Protecting Your Health Privacy empowers ordinary citizens with the legal and technological knowledge and know-how we need to protect ourselves and our families from prying corporate eyes, medical ide… |
OL16465587W |
|
Collaborative computer security and trust management
|
Jean-Marc Seigneur |
"This book combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field"--Provided by publisher. |
OL16936264W |
|
Privacy in the Age of Big Data
|
Theresa M. Payton,Theodore Claypoole |
Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to ge… |
OL17047064W |
|
Privacy in the age of big data
|
Theresa Payton |
Highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. |
OL19671007W |
|
Data Privacy Management and Autonomous Spontaneous Security
|
Roberto Pietro |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… |
OL19840128W |
|
Information Security Practice and Experience
|
Robert H. Deng |
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised ful… |
OL19857516W |
|
Information Security Applications
|
Dong Hoon Lee |
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.… |
OL19857525W |
|
IT-Sicherheit mit System
|
Klaus-Rainer Müller |
Prof. Damian Weber, Saarbrücken, empfiehlt dieses Buch seinen Studenten, "weil es eines der wenigen Bücher zur Sicherheit ist, das gut strukturiert ist." Wegweisendes Handlungswissen, um IT-Prozesse … |
OL19877462W |
|
Protocols for Authentication and Key Establishment
|
Colin Boyd |
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities o… |
OL19897610W |
|
Research Directions in Data and Applications Security
|
Ehud Gudes |
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems an… |
OL19899673W |
|
Secure IT Systems
|
Audun Jøsang |
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully revi… |
OL19901254W |
|
Security of Data and Transaction Processing
|
Vijay Atluri |
<Em>Security of Data and Transaction Processing</em> brings together in one place important contributions and up-to-date research results in this fast moving area. <br/> <em>Security of Data and Tran… |
OL19901265W |
|
Security and Privacy in Communication Networks
|
Angelos D. Keromytis |
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The… |
OL19901284W |
|
Security and Trust Management
|
Audun Jøsang |
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in con… |
OL19901295W |
|
Smart Grid Security
|
Jorge Cuellar |
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirement… |
OL19902432W |
|
Privacy at Risk
|
Christopher Slobogin,Christopher Slobogin |
Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other… |
OL2033368W |
|
Invasion of privacy
|
Louis R. Mizell |
A former intelligence officer and president of an international security group, shares up to the minute strategies for safeguarding your privacy. Although no measure of protection is foolproof, this … |
OL2227034W |