Skip to Content

Books by Subject

Computing & IT Security Books

You are currently browsing 1–10 of 37 new and published books in the subject of Computing & IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Cyberthreats and the Decline of the Nation-State

    By Susan W. Brenner

    Series: Routledge Research in Information Technology and E-Commerce Law

    This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W....

    Published March 4th 2014 by Routledge

  2. Trade Secret Theft, Industrial Espionage, and the China Threat

    By Carl Roper

    Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage...

    Published December 10th 2013 by CRC Press

  3. Information Security Management Handbook, 2013 CD-ROM Edition

    Edited by James S. Tiller, Rich O'Hanley

    Containing the complete contents of Volumes 1-7, the Information Security Management Handbook, 2013 CD-ROM Edition is an authoritative resource that is linked and searchable by keyword. It updates the benchmark Volume 1 with information on the latest developments in information security and recent...

    Published October 15th 2013 by Auerbach Publications

  4. Conflict and Cooperation in Cyberspace

    The Challenge to National Security

    Edited by Panayotis A Yannakogeorgos, Adam B Lowther

    Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world’s most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world....

    Published July 22nd 2013 by CRC Press

  5. Organizational Resilience

    Managing the Risks of Disruptive Events - A Practitioner’s Guide

    By James J. Leflar, Marc H. Siegel

    Moving towards resiliency is more than just implanting policy and procedure; it is a process that takes organizations on a winding path requiring patience and tolerance. A good deal of learning will have to take place during the trip and that is why it is necessary to have patience and tolerate the...

    Published May 20th 2013 by CRC Press

  6. Random Dynamical Systems in Finance

    By Anatoliy Swishchuk, Shafiqul Islam

    The theory and applications of random dynamical systems (RDS) are at the cutting edge of research in mathematics and economics, particularly in modeling the long-run evolution of economic systems subject to exogenous random shocks. Despite this interest, there are no books available that solely...

    Published April 23rd 2013 by Chapman and Hall/CRC

  7. Critical Infrastructure System Security and Resiliency

    By Betty Biringer, Eric Vugrin, Drake Warren

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical...

    Published April 12th 2013 by CRC Press

  8. Supply Chain Security

    A Comprehensive Approach

    By Arthur G. Arway

    The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and role within the chain—as well as its own...

    Published March 1st 2013 by CRC Press

  9. Catastrophic Impact and Loss

    The Capstone of Impact Assessment

    By Kevin D. Burton

    The author’s previous work, Managing Emerging Risk: The Capstone of Preparedness considered the notion of risk and what constitutes risk assessment. It presented scenarios to introduce readers to areas of critical thinking around probability and possibility. Six months after the book’s publication,...

    Published October 25th 2012 by CRC Press

  10. Introduction to Surveillance Studies

    By J.K. Petersen

    Surveillance is a divisive issue—one might say it is inherently controversial. Used by private industry, law enforcement, and for national security, it can be a potent tool for protecting resources and assets. It can also be extremely invasive, calling into question our basic rights to freedom and...

    Published October 12th 2012 by CRC Press