Skip to Content

Books by Subject

IT Security Books

You are currently browsing 1–10 of 248 new and published books in the subject of IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Multilevel Security for Relational Databases

    By Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, Hala S. El-Sayed

    Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support...

    Published December 4th 2014 by Auerbach Publications

  2. Information Systems for Emergency Management

    By Bartel Van De Walle, Murray Turoff, Starr Roxanne Hiltz

    This book provides the most current and comprehensive overview available today of the critical role of information systems in emergency response and preparedness. It includes contributions from leading scholars, practitioners, and industry researchers, and covers all phases of disaster management -...

    Published November 18th 2014 by Routledge

  3. Cybervetting

    Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

    By Edward J. Appel

    Researching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for...

    Published November 12th 2014 by CRC Press

  4. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    Published October 29th 2014 by Chapman and Hall/CRC

  5. Physical Security and Safety

    A Field Guide for the Practitioner

    Edited by Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

    Series: Occupational Safety & Health Guide Series

    How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the...

    Published October 29th 2014 by CRC Press

  6. Android Malware and Analysis

    By Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere

    The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware...

    Published October 24th 2014 by Auerbach Publications

  7. The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

    By Rebecca Herold, Kevin Beaver

    Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the...

    Published October 20th 2014 by Auerbach Publications

  8. Official (ISC)2 Guide to the HCISPP CBK

    Edited by Steven Hernandez

    Series: (ISC)2 Press

    HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one...

    Published September 10th 2014 by Auerbach Publications

  9. Case Studies in Intelligent Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date...

    Published August 29th 2014 by Auerbach Publications

  10. Case Studies in Secure Computing

    Achievements and Trends

    Edited by Biju Issac, Nauman Israr

    In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the...

    Published August 29th 2014 by Auerbach Publications