Skip to Content

Books by Subject

IT Security Books

You are currently browsing 1–10 of 254 new and published books in the subject of IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Securing Systems

    Applied Security Architecture and Threat Models

    By Brook S. E. Schoenfield

    Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This...

    Published May 20th 2015 by CRC Press

  2. Fraud Examiners in White-Collar Crime Investigations

    By Petter Gottschalk

    In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime. He also presents a general theory regarding the economic, organizational, and behavioral dimensions of its perpetrators. Pool Your...

    Published May 20th 2015 by CRC Press

  3. Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition

    By Joseph Steinberg

    Series: (ISC)2 Press

    The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the...

    Published May 14th 2015 by Auerbach Publications

  4. Web Security

    A WhiteHat Perspective

    By Hanqing Wu, Liz Zhao

    In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security:...

    Published April 6th 2015 by Auerbach Publications

  5. EU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMP

    By Orlando Lopez

    Good Manufacturing Practice (GMP) ensures medicinal products are produced consistently and controlled to the quality standards appropriate for their intended use and as required by product specifications or marketing authorization. Annex 11 details the European Medicines Agency (EMA) GMP...

    Published April 6th 2015 by CRC Press

  6. Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

    Edited by Adam Gordon

    Series: (ISC)2 Press

    As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a...

    Published March 11th 2015 by Auerbach Publications

  7. Cybercrime and Digital Forensics

    An Introduction

    By Thomas J Holt, Adam M Bossler, Kathryn C Seigfried-Spellar

    The emergence of the World Wide Web, smartphones, and Computer-Mediated Communications (CMCs) profoundly affect the way in which people interact online and offline. Individuals who engage in socially unacceptable or outright criminal acts increasingly utilize technology to connect with one another...

    Published January 27th 2015 by Routledge

  8. The Data Bank Society (Routledge Revivals)

    Organizations, Computers and Social Freedom

    By John Smith

    Series: Routledge Revivals

    This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy...

    Published January 19th 2015 by Routledge

  9. Data Privacy for the Smart Grid

    By Rebecca Herold, Christine Hertzog

    Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its...

    Published January 15th 2015 by Auerbach Publications

  10. Multilevel Security for Relational Databases

    By Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, Hala S. El-Sayed

    Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support...

    Published December 4th 2014 by Auerbach Publications