Skip to Content

Books by Subject

Computing & IT Security Books

You are currently browsing 1–10 of 38 new and published books in the subject of Computing & IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Intelligence-Based Security in Private Industry

    By Thomas A. Trier

    In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to...

    Published June 22nd 2015 by CRC Press

  2. Corporate Security Intelligence and Strategic Decision Making

    By Justin Crump

    Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, the subject of corporate security intelligence remains poorly understood. An effective intelligence process can directly support and positively impact operational activity and...

    Published April 28th 2015 by CRC Press

  3. Cyberthreats and the Decline of the Nation-State

    By Susan W. Brenner

    Series: Routledge Research in Information Technology and E-Commerce Law

    This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W....

    Published March 4th 2014 by Routledge

  4. Trade Secret Theft, Industrial Espionage, and the China Threat

    By Carl Roper

    Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage...

    Published December 10th 2013 by CRC Press

  5. Information Security Management Handbook, 2013 CD-ROM Edition

    Edited by James S. Tiller, Rich O'Hanley

    Containing the complete contents of Volumes 1-7, the Information Security Management Handbook, 2013 CD-ROM Edition is an authoritative resource that is linked and searchable by keyword. It updates the benchmark Volume 1 with information on the latest developments in information security and recent...

    Published October 15th 2013 by Auerbach Publications

  6. Conflict and Cooperation in Cyberspace

    The Challenge to National Security

    Edited by Panayotis A Yannakogeorgos, Adam B Lowther

    Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world’s most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world....

    Published July 22nd 2013 by CRC Press

  7. Organizational Resilience

    Managing the Risks of Disruptive Events - A Practitioner’s Guide

    By James J. Leflar, Marc H. Siegel

    Moving towards resiliency is more than just implanting policy and procedure; it is a process that takes organizations on a winding path requiring patience and tolerance. A good deal of learning will have to take place during the trip and that is why it is necessary to have patience and tolerate the...

    Published May 20th 2013 by CRC Press

  8. Random Dynamical Systems in Finance

    By Anatoliy Swishchuk, Shafiqul Islam

    The theory and applications of random dynamical systems (RDS) are at the cutting edge of research in mathematics and economics, particularly in modeling the long-run evolution of economic systems subject to exogenous random shocks. Despite this interest, there are no books available that solely...

    Published April 23rd 2013 by Chapman and Hall/CRC

  9. Critical Infrastructure System Security and Resiliency

    By Betty Biringer, Eric Vugrin, Drake Warren

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical...

    Published April 12th 2013 by CRC Press

  10. Supply Chain Security

    A Comprehensive Approach

    By Arthur G. Arway

    The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and role within the chain—as well as its own...

    Published March 1st 2013 by CRC Press