Skip to Content

Books by Subject

IT Security Books

You are currently browsing 1–10 of 252 new and published books in the subject of IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Web Security

    A WhiteHat Perspective

    By Hanqing Wu, Liz Zhao

    In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security:...

    Published April 6th 2015 by Auerbach Publications

  2. EU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMP

    By Orlando Lopez

    Good Manufacturing Practice (GMP) ensures medicinal products are produced consistently and controlled to the quality standards appropriate for their intended use and as required by product specifications or marketing authorization. Annex 11 details the European Medicines Agency (EMA) GMP...

    Published April 6th 2015 by CRC Press

  3. Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

    Edited by Adam Gordon

    Series: (ISC)2 Press

    As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a...

    Published March 11th 2015 by Auerbach Publications

  4. Cybercrime and Digital Forensics

    An Introduction

    By Thomas J Holt, Adam M Bossler, Kathryn C Seigfried-Spellar

    The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another...

    Published January 27th 2015 by Routledge

  5. The Data Bank Society (Routledge Revivals)

    Organizations, Computers and Social Freedom

    By John Smith

    Series: Routledge Revivals

    This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy...

    Published January 19th 2015 by Routledge

  6. Data Privacy for the Smart Grid

    By Rebecca Herold, Christine Hertzog

    Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its...

    Published January 15th 2015 by Auerbach Publications

  7. Multilevel Security for Relational Databases

    By Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, Hala S. El-Sayed

    Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support...

    Published December 4th 2014 by Auerbach Publications

  8. Cybervetting

    Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

    By Edward J. Appel

    Researching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for...

    Published November 12th 2014 by CRC Press

  9. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    Published October 29th 2014 by Chapman and Hall/CRC

  10. Physical Security and Safety

    A Field Guide for the Practitioner

    Edited by Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

    Series: Occupational Safety & Health Guide Series

    How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the...

    Published October 29th 2014 by CRC Press