You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that
All too often, a simple lack of understanding of fundamental business concepts is enough to prevent capable scientists and engineers from receiving otherwise deserved promotions. These days, technical merit and hard work alone no longer guarantee upward mobility. For scientists and engineers with aspirations of moving up the corporate ladder a keen
According to the Brookings Institute, an organization's information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental conc
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any organization is its capacity for quick system-wide response, current emphasis needs to be placed on maintaining the integrity of IT applications, so critical to the real and the virtual infrastructure and productivity of any community or business entity. Written by international security consultant Park Foreman, Vulnerability Management demonstrates a proactive approach. ...
Criminal psychology, and its relationship to the practice of law, has become a topic of major significance over the last three decades. Psychologists play a key role in modern criminal investigation and are central to crime reduction measures such as offender profiling, delinquency prevention and tackling fear of crime. Contributors from North America, Europe and Australia examine this link, both adding to and drawing upon the pool of recent theory construction and empirical work in the following areas: * causes and prevention of offending * studies of crime and offenders * the victim's perspective * witnesses and testimony * studies of legal processes. These issues are studied from a 'local' perspective that recognises not only the need for cross-national comparative research, but also the generation of a corpus of scientific knowledge more representative of the complexity of criminal and legal investigation today.
A How-to Guide for Implementing Algorithms and Protocols Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encrypti...
Organization of data warehouses are vital but often ignored aspects of growing enterprises. This work merges technological know-how with managerial practices to show both the business manager and the IT professional how better alignment between data warehouse plans and business strategies can lead to a successful data warehouse adoption that will support the entire infrastructure. More complete than any other text in the field, this resource also addresses the managerial and strategic aspects of data warehouses, offering doable solutions that will allow for the strategic alignment of these warehouses while building them and ensuring that this alignment is sustained.
The Defense of Insanity, The World Over is the 10th in a series of books that examines and compares social issues or social problems from an explicitly comparative perspective. This volume examines and compares the criteria and procedures surrounding the defense of insanity across twenty-two countries. In addition to the criteria for each of the countries, Simon and Ahn-Redding report the burden of proof; whether this burden is on the side of the defense or the prosecution; the degree, beyond a reasonable doubt or by a preponderance of the evidence; the form the verdict takes; who typically decides, a judge or a jury; what role experts play in the proceedings; and what happens to the defenda...
The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing t
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations