Skip to Content

Books by Subject

IT Security Books

You are currently browsing 1–10 of 235 new and published books in the subject of IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Official (ISC)2 Guide to the HCISPP CBK

    Edited by Steven Hernandez

    Series: (ISC)2 Press

    HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one...

    Published September 9th 2014 by Auerbach Publications

  2. Case Studies in Intelligent Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date...

    Published August 28th 2014 by Auerbach Publications

  3. Case Studies in Secure Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the...

    Published August 28th 2014 by Auerbach Publications

  4. Secure Data Provenance and Inference Control with Semantic Web

    By Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar

    With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment...

    Published July 31st 2014 by Auerbach Publications

  5. Ethical Hacking and Penetration Testing Guide

    By Rafay Baloch

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking...

    Published July 27th 2014 by Auerbach Publications

  6. Official (ISC)2® Guide to the CCFP CBK

    Edited by Peter Stephenson

    Series: (ISC)2 Press

    Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has—requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis. The Certified Cyber Forensics Professional (CCFPSM) designation ensures that...

    Published July 23rd 2014 by Auerbach Publications

  7. Military Ethics and Emerging Technologies

    Edited by Timothy J. Demy, George R. Lucas Jr., Bradley J. Strawser

    This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. Although the nature and politics of war never change, the weapons and technologies used in war do change and are always undergoing development. Because of that, the arsenal of weapons...

    Published June 25th 2014 by Routledge

  8. Wireless Multimedia Communication Systems

    Design, Analysis, and Implementation

    By K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

    Published June 23rd 2014 by CRC Press

  9. The Frugal CISO

    Using Innovation and Smart Approaches to Maximize Your Security Posture

    By Kerry Ann Anderson

    If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security...

    Published May 18th 2014 by Auerbach Publications

  10. PCI Compliance

    The Definitive Guide

    By Abhay Bhargav

    Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide...

    Published May 4th 2014 by Auerbach Publications