Skip to Content

Books by Subject

Computing & IT Security Books

You are currently browsing 1–10 of 159 new and published books in the subject of Computing & IT Security — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. The Frugal CISO

    Using Innovation and Smart Approaches to Maximize Your Security Posture

    By Kerry Ann Anderson

    If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security...

    Published May 19th 2014 by Auerbach Publications

  2. Security without Obscurity

    A Guide to Confidentiality, Authentication, and Integrity

    By J.J. Stapleton

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

    Published May 2nd 2014 by Auerbach Publications

  3. Fraud Prevention and Detection

    Warning Signs and the Red Flag System

    By Rodney T. Stamler, Hans J. Marschdorf, Mario Possamai

    Lessons can be learned from major fraud cases. Whether the victim is a company, public agency, nonprofit, foundation, or charity, there is a high likelihood that many of these frauds could have been prevented or detected sooner if early Red Flag warning signs had been identified and acted upon....

    Published March 12th 2014 by CRC Press

  4. Cyberthreats and the Decline of the Nation-State

    By Susan W. Brenner

    Series: Routledge Research in Information Technology and E-Commerce Law

    This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W....

    Published March 4th 2014 by Routledge

  5. Modern Geopolitics and Security

    Strategies for Unwinnable Conflicts

    By Amos N. Guiora

    The transformation from traditional war between nation-states to conflict between nation-states and nonstate actors requires decision makers, policy analysts, military commanders, intelligence officials, and legislators to answer the question: is there a strategy for an unwinnable conflict? This...

    Published December 20th 2013 by CRC Press

  6. Trade Secret Theft, Industrial Espionage, and the China Threat

    By Carl Roper

    Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage...

    Published December 10th 2013 by CRC Press

  7. Managing Risk and Security in Outsourcing IT Services

    Onshore, Offshore and the Cloud

    By Frank Siepmann

    With cloud computing quickly becoming a standard in today’s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments—requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and...

    Published December 9th 2013 by Auerbach Publications

  8. Security Management

    A Critical Thinking Approach

    By Michael Land, Truett Ricks, Bobby Ricks

    Series: Occupational Safety & Health Guide Series

    Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals...

    Published December 4th 2013 by CRC Press

  9. The CRC Press Terrorism Reader

    By Marie-Helen Maras

    The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as...

    Published November 11th 2013 by CRC Press

  10. Responsive Security

    Be Ready to Be Secure

    By Meng-Chow Kang

    Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a...

    Published October 18th 2013 by CRC Press