Skip to Content

Books by Subject

IT Security Books

You are currently browsing 1–10 of 229 new and published books in the subject of IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Military Ethics and Emerging Technologies

    Edited by Timothy J. Demy, George R. Lucas Jr., Bradley J. Strawser

    This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. Although the nature and politics of war never change, the weapons and technologies used in war do change and are always undergoing development. Because of that, the arsenal of weapons...

    Published June 25th 2014 by Routledge

  2. Wireless Multimedia Communication Systems

    Design, Analysis, and Implementation

    By K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

    Published June 23rd 2014 by CRC Press

  3. The Frugal CISO

    Using Innovation and Smart Approaches to Maximize Your Security Posture

    By Kerry Ann Anderson

    If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security...

    Published May 18th 2014 by Auerbach Publications

  4. PCI Compliance

    The Definitive Guide

    By Abhay Bhargav

    Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide...

    Published May 4th 2014 by Auerbach Publications

  5. Security without Obscurity

    A Guide to Confidentiality, Authentication, and Integrity

    By J.J. Stapleton

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

    Published May 1st 2014 by Auerbach Publications

  6. Conducting Network Penetration and Espionage in a Global Environment

    By Bruce Middleton

    When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

    Published April 27th 2014 by Auerbach Publications

  7. Security for Service Oriented Architectures

    By Walter Williams

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both...

    Published April 23rd 2014 by Auerbach Publications

  8. Anonymous Communication Networks

    Protecting Privacy on the Web

    By Kun Peng

    In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for...

    Published April 9th 2014 by Auerbach Publications

  9. Intrusion Detection in Wireless Ad-Hoc Networks

    Edited by Nabendu Chaki, Rituparna Chaki

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the...

    Published February 5th 2014 by CRC Press

  10. The State of the Art in Intrusion Prevention and Detection

    Edited by Al-Sakib Khan Pathan

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged...

    Published January 28th 2014 by Auerbach Publications