Legal aspects Books

215 products


  • Social Media Warfare

    Taylor & Francis Ltd Social Media Warfare

    1 in stock

    Book SynopsisSocial media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.Table of ContentsA Framework to Analyze Emerging Social Media Warfare Strategies. Civilian Government Use of Social Media to Attack, Defend, or Control. Military Applications of Social Media Warfare. Corporate Efforts to Deploy or Respond to Social Media Warfare Strategies. Special Interest Groups use of Social Media Warfare. Social Media Warfare in the Political Electoral Process. Social Media Warfare for Support of Social Causes. The Mercenaries and Activists of Social Media Warfare. Social Media as a Weapon to Recruit and Inspire Violent Extremists. Social Media Warfare for Celebrity and People of Notoriety. Child Victims in Social Media Warfare. Adult Victims in Social Media Warfare. Law Enforcement Response to Social Media Warfare. Educational Institutions Response to Social Media Warfare. Monitoring Social Media Warfare Threats.

    1 in stock

    £56.99

  • The CISO Journey

    Taylor & Francis Ltd The CISO Journey

    1 in stock

    Book SynopsisThe book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a Rule of Information Security developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.Trade ReviewAs a CISO, I approached Gene's book with caution. Put two such people in a room and ask them a question, and an argument will inevitably ensue - even if they agree. Therefore, and as you might expect, I found some of Gene's conclusions to differ from mine. But what really stood out to me is how, even as I was having these arguments play out inside my head, I seemed to also be adopting an almost imperceptible yet constant nod. I could not help but enjoy reading his thoughtful analysis of every information security topic that he chooses to tackle, and his ability to tie everything together in an easy-to-understand, clear and logical fashion is highly appreciated and sorely needed in the industry.Then, as I continued my journey through Gene's carefully laid-out thoughts and explanations, personal experiences, war stories, and insightful advice, it became apparent that this is far more than merely an instructional book into the many aspects of managing information security. Indeed, for anyone who is interested in advancing their career in the field, this book offers countless tools that can be followed to success, in every area. Just the chapter "NEVER trust and ALWAYS verify" is itself worth the price of admission.Consume it slowly, and give it the attention it deserves, and Gene's book will repay you for it in spades. You may not follow his exact path, but whatever path you take, his guidance will certainly help you forward.-- Barak Engel, CISO and author of Why CISOs Fail: The Missing Link in Security Management--and How to Fix ItTable of ContentsList of FiguresList of TablesPrologueForewordAcknowledgmentsAuthorSection I INTRODUCTION AND HISTORY1 Introduction: The Journey2 Learning from History?3 My First CISO Lesson: The SquirrelSection II THE RULES AND INDUSTRY DISCUSSION4 A Weak Foundation Amplifies Risk5 If a Bad Guy Tricks You into Running His Code on Your Computer, It’s Not Your Computer Anymore6 There’s Always a Bad Guy Out There Who’s Smarter, More Knowledgeable, or Better-Equipped Than You7 Know the Enemy, Think Like the Enemy8 Know the Business, Not Just the Technology9 Technology Is Only One-Third of Any Solution10 Every Organization Must Assume Some Risk11 When Preparation Meets Opportunity, Excellence Happens12 There Are Only Two Kinds of Organizations: Those That Know They’ve Been Compromised and Those That Don’t Know Yet13 In Information Security, Just Like in Life, Evolution Is Always Preferable to Extinction14 A Security Culture Is In Place When Talk Is Replaced with Action15 NEVER Trust and ALWAYS VerifySection III SUMMARY16 My Best Advice for New CISOsAppendix A: The Written Information Security PlanAppendix B: Talking to the BoardAppendix C: Establishing an Incident Response ProgramAppendix D: Sample High-Level Risk Assessment Methodology

    1 in stock

    £109.25

  • The Politics of Data Transfer

    Taylor & Francis Ltd The Politics of Data Transfer

    15 in stock

    Book SynopsisIn this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States. She argues that the Safe Harbor, PNR, and SWIFT agreements were made to mitigate the potentially negative effects that may arise from the beyond-the-border reach of EU data protection rules or US counterterrorism regulation. A close examination of these high-profile cases would reveal how beyond-the-border reach of one jurisdiction's regulation might affect another jurisdiction's policy and what responses the affected jurisdiction possibly makes to manage the effects of such extraterritorial regulation.The Politics of Data Transfer adds another dimension to the study of transatlantic data conflicts by assuming that the cases exemplify not only the politics of data privacy but also the politics of extratTrade Review'Personal information is the 21st century’s currency of power. And like gold or paper money, it finds itself increasingly at the center of global political struggles. The Politics of Data Transfer deftly demonstrates that unlike regimes for trade or monetary policy, the political battle is not centered at the tables of international organizations like the World Trade Organization or the International Monetary Fund. Instead, it paints a world in which domestic law (in this case European rules on data privacy) spillover globally, roiling trade and security relations. How these disputes get resolved will determine the terms of global competition as well as the extent of cooperation over key policy issues like counter-terrorism. This book is an excellent call to arms, reminding us to take such dynamics seriously.' - Abraham Newman, Director, Mortara Center for International Studies, Georgetown UniversityTable of ContentsForeword. Introduction 1. The Politics of Data Privacy 2. The Politics of Extraterritorial Regulation 3. The EU Data Protection Directive 4. From Safe Harbor to Privacy Shield 5. The PNR Dispute 6. The EU PNR Directive 7. The SWIFT Affair 8. Data Privacy and Free Trade Agreements 9. Conclusion

    15 in stock

    £128.25

  • Ethics for a Digital Age

    Peter Lang Publishing Inc Ethics for a Digital Age

    Out of stock

    Book SynopsisThematically organized around three of the most pressing ethical issues of the digital age (shifting of professional norms, moderating offensive content, and privacy), this volume offers a window into some of the hot-button ethical issues facing a society where digital has become the new normal. Straddling an applied ethical and theoretical approach, the research represented not only reflects on how our ethical frameworks have been changed and challenged by digital technology, but also provides insights for those confronted with specific ethical dilemmas related to digital technology. With contributions from established experts and up-and-coming scholars alike, this book cuts across disciplines and with appeal to communication scholars, philosophers, and anyone with an interest in ethics and technology.Table of ContentsContents: Ashley Rose Kelly: Emerging Genres of Science Communication and Their Ethical Exigencies – Kathleen Bartzen Culver and Michael Mirer: Constrained Independence: Digital Branded Content in Sports through the Lens of Journalism Ethics – Jason M. Shepard: The Emerging Uses of Ethical Principles in Journalist’s Privilege Law – Thorsten Busch: Corporate Responsibility in the Videogames Industry: Mapping the Territory – J. David Wolfgang: Opening the Marketplace: A Case for the Protection of Anonymous Online Comments – Jonathan Peters: Considering and Constraining the Power of Content Hosts – Caitlin Ring Carlson: Hashtags and Hate Speech: The Legal and Ethical Responsibilities of Social Media Companies to Manage Content Online – Burcu S. Bakioğlu: When the Inmates Run the Asylum: Grief Play in the Virtual Panopticon of Second Life – Lynn Schofield Clark: The Ethics of Engagement: Considering Digital Ethics in a Critical Participatory Action Research Project with Urban Youth – Anntette N. Markham: From Using to Sharing: A Story of Shifting Fault Lines in Privacy and Data Protection Discourse – Jan Fernback: Privacy Rights and Data Brokers: The Ethics of a Targeted Surveillance Regime – Bastiaan Vanacker: Concluding Remarks.

    Out of stock

    £30.07

  • Ethics for a Digital Age

    Peter Lang Publishing Inc Ethics for a Digital Age

    Out of stock

    Book SynopsisThematically organized around three of the most pressing ethical issues of the digital age (shifting of professional norms, moderating offensive content, and privacy), this volume offers a window into some of the hot-button ethical issues facing a society where digital has become the new normal. Straddling an applied ethical and theoretical approach, the research represented not only reflects on how our ethical frameworks have been changed and challenged by digital technology, but also provides insights for those confronted with specific ethical dilemmas related to digital technology. With contributions from established experts and up-and-coming scholars alike, this book cuts across disciplines and with appeal to communication scholars, philosophers, and anyone with an interest in ethics and technology.Table of ContentsContents: Ashley Rose Kelly: Emerging Genres of Science Communication and Their Ethical Exigencies – Kathleen Bartzen Culver and Michael Mirer: Constrained Independence: Digital Branded Content in Sports through the Lens of Journalism Ethics – Jason M. Shepard: The Emerging Uses of Ethical Principles in Journalist’s Privilege Law – Thorsten Busch: Corporate Responsibility in the Videogames Industry: Mapping the Territory – J. David Wolfgang: Opening the Marketplace: A Case for the Protection of Anonymous Online Comments – Jonathan Peters: Considering and Constraining the Power of Content Hosts – Caitlin Ring Carlson: Hashtags and Hate Speech: The Legal and Ethical Responsibilities of Social Media Companies to Manage Content Online – Burcu S. Bakioğlu: When the Inmates Run the Asylum: Grief Play in the Virtual Panopticon of Second Life – Lynn Schofield Clark: The Ethics of Engagement: Considering Digital Ethics in a Critical Participatory Action Research Project with Urban Youth – Anntette N. Markham: From Using to Sharing: A Story of Shifting Fault Lines in Privacy and Data Protection Discourse – Jan Fernback: Privacy Rights and Data Brokers: The Ethics of a Targeted Surveillance Regime – Bastiaan Vanacker: Concluding Remarks.

    Out of stock

    £111.10

  • Case Analyses for Intellectual Property Law and

    Peter Lang Publishing Inc Case Analyses for Intellectual Property Law and

    Out of stock

    Book SynopsisThis text is a companion to the 2nd edition of Intellectual Property Law And New Media: Free for a Fee. Moving the coverage of case analysis to this separate volume, enables the authors to focus their attention on important trial and legal procedures that apply extant law to, largely, new circumstances.Readers can focus on history and concepts while reading the main text, allowing them to bring understandings derived there to bear on the cases found in this analytic text. The approach offers relief from information overload and allows time and space to shift gears between concepts and cases. To aid understanding and learning, the authors provide focused interpretations and analysis throughout. The coverage allows these books to serve as an excellent resource for undergraduates studying interactive media, as well as being a primer for first year IP law students, a handbook for entrepreneurs, a guidebook for general lawyers to assist in referrals, and an interestiTable of ContentsContents: Copyright Cases – Three Copyright Issues Cases – Patent Cases – Open Source Cases – Trademark Cases – Trade Secrets Cases – Tort Laws for Intellectual Property of the Persona Cases – International Intellectual Property Laws and Systems Cases – Digital Rights Management Cases – Intellectual Property Law in Virtual Worlds and Games Cases.

    Out of stock

    £22.04

  • Vein Pattern Recognition

    Taylor & Francis Inc Vein Pattern Recognition

    Out of stock

    Book SynopsisAs one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explainsTrade Review… a clear road map for the past, present, and future of biometrics ... a practical guide to biometrics in a clear and easy to understand form, even for non-technicians. This thoroughly researched book covers the main technologies in use today and explains the principles of operation and appropriate uses of each. … provides significant details for each system. ... Read this book and get a glimpse of how bright the future can be if we are all empowered rather than encumbered by technology— Kevin R. Walsh, Senior Vice President R&D, Oracle Corporation, Asia Pacific DivisionChapter Five is especially insightful, detailing the various uses of VPR biometrics and how it has seen significant use in Japan, especially in the financial sector for identity verification. … an excellent reference for anyone who wants to get a handle on the various types of biometric technologies.— Ben Rothke, CISSP, CISA, in Security ManagementTable of ContentsIdentity. Biometrics Modalities. Anatomy of Biometric Systems. Vein Pattern Recognition Modality. Vein Pattern Recognition Applications. Evaluation and Protection of Vein Pattern Recognition Systems. Plan Your Biometric System: A How-To Guide. Issues in Vein Pattern Recognition. Glossary. Index.

    Out of stock

    £36.09

  • Practical Risk Management for the CIO

    Taylor & Francis Inc Practical Risk Management for the CIO

    Out of stock

    Book SynopsisThe growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invisible until disaster strikes. Detailing procedures to help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management and information security. It provides easy-to-follow guidance on how to effectively manage the flow of information and incorporate both service delivery and reliability. Explains why every CIO should be managing his or her information differently Provides time-tested risk ranking strategies Considers Trade ReviewThis is an exceptionally well-written primer for anyone responsible for corporate information risk management. … It's obvious that the author has regularly encountered and solved the problems he describes in the course of his three decades in Canadian government and justice IT, and he has an appealing no-nonsense approach. …the true greatest strength of this book is its holistic viewpoint - all too rare and much appreciated - that demonstrates how all the disparate aspects of information management actually fit together to create a robust business asset base. I can unhesitatingly recommend it, not only to CIOs but also to anyone tasked with protecting corporate information assets, whatever the level of their role. It imparts understanding, which is vastly more useful than mere facts. An excellent holistic primer on corporate information management. The author's credentials are fully justified by the clear, concise and informative text. A must-have for CIOs and anyone else managing business information assets.—Michael Barwise, BSc, CEng, CITP, MBCS, in InfoSec Reviews, September 2011 This is an exceptionally well-written primer for anyone responsible for corporate information risk management. … It's obvious that the author has regularly encountered and solved the problems he describes in the course of his three decades in Canadian government and justice IT, and he has an appealing no-nonsense approach. …the true greatest strength of this book is its holistic viewpoint - all too rare and much appreciated - that demonstrates how all the disparate aspects of information management actually fit together to create a robust business asset base. I can unhesitatingly recommend it, not only to CIOs but also to anyone tasked with protecting corporate information assets, whatever the level of their role. It imparts understanding, which is vastly more useful than mere facts. An excellent holistic primer on corporate information management. The author's credentials are fully justified by the clear, concise and informative text. A must-have for CIOs and anyone else managing business information assets.—Michael Barwise, BSc, CEng, CITP, MBCS, in InfoSec Reviews, September 2011 Table of ContentsIntroduction: Why Risk Management? Liability. Service Delivery. PRINCIPLES AND CONCEPTS. Overview. Basic Concepts, Principles, and Practices. Risk Assessment, Analysis, and Procedures. Metrics. Best Practices. SERVICE DELIVERY. Product Management. Process Management. Project Management. IT Service Management. Reporting on Service Delivery. LIABILITIES MANAGEMENT. Information Management. Information Protection. E-Discovery. Privacy. Policies and Procedures. Planning for Big Failures or Business Continuity. PUTTING IT ALL TOGETHER. Designing a Risk Management Strategy. Forward-Looking Risk Management. Preparing for a "Black Swan". APPENDICES: OECD Privacy Principles. Project Profiling Risk Assessment. Risk Impact Scales. Classification Schema.

    Out of stock

    £114.00

  • Managing the Insider Threat No Dark Corners

    Taylor & Francis Managing the Insider Threat No Dark Corners

    1 in stock

    Book SynopsisAn adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. Drawn from the findings of an award-winning thesis, Managing the Insider Threat: No Dark Corners is the first comprehensive resource to use social science research to explain why traditional methods fail against these trust betrayers. In this groundbreaking book, author Nick Catrantzos identifies new management, security, and workplace strategies for categorizing and defeating insider threats.The book begins with problem definition and research findings that lead to the No Dark Corners strategy for addressing insider threats. With these foundational underpinnings, the book then examines agents of change within the workplaceânamely, key players in positions to effectively support or undermine the No Dark Corners strategy, including corporate sentinels and leaders affecting application of this approach. From there

    1 in stock

    £123.50

  • Justice in the Digital State

    Bristol University Press Justice in the Digital State

    15 in stock

    Book SynopsisExploring how justice is delivered at a time of rapid technological transformation, Justice in the Digital State exposes urgent issues surrounding the modernisation of courts and tribunals. This cutting-edge research offers an authoritative and much-needed guide for navigating through the challenges of digital disruption.Trade Review''This book addresses issues of profound importance. Tomlinson argues that the growing use of technology forces us to revisit and possibly abandon existing ways of understanding how administrative justice operates.'' Maurice Sunkin, University of EssexTable of ContentsForeword ~ Carol Harlow; A functional framework; Crowdfunding and the changing dynamics of public interest judicial review; The tribunals gamble; How digital administrative justice gets made.

    15 in stock

    £13.29

  • Official ISC2 Guide to the CSSLP CBK

    Taylor & Francis Ltd Official ISC2 Guide to the CSSLP CBK

    1 in stock

    Book SynopsisApplication vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequencesdata breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in softTable of Contents Secure Software Concepts. Secure Software Requirements. Secure Software Design. Secure Software Implementation/Coding. Software Acceptance. Software Deployment, Operations, Maintenance, and Disposal. Supply Chain and Software Acquisition. Appendices.

    1 in stock

    £75.99

  • Official ISC2Â Guide to the CISSPÂISSMPÂ CBKÂ

    CRC Press Official ISC2Â Guide to the CISSPÂISSMPÂ CBKÂ

    1 in stock

    Book SynopsisThe Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP ) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the ISSMP need to demonstrate a thorough understanding of the five domains of the ISSMP Common Body of Knowledge (CBK ), along with the ability to apply this in-depth knowledge to establish, present, and govern information security programs, while demonstrating management and leadership skills.Supplying an authoritative review of key concepts and requirements, the Official (ISC)2 Guide to the CISSP -ISSMP CBK , Second Edition is both up to date and relevant. This book provides a comprehensive review of the five domains in the ISSMP CBK: Security Leadership and Management, Security Lifecycle Management, Security Compliance Management, Contingency Management, and Law, EthTrade Review"A CISSP-ISSMP is the best of both worlds—the master of technical and managerial IT, with the added bonus of business acumen that resonates with the C-suite."—W. Hord Tipton, Former Executive Director, (ISC)2Table of ContentsDomain 1 — Security Leadership & Management : Mission Statements. Business Functions. Define the Security Governance Structure. Domain 2 — Security Lifecycle Management: Managing Security in Different Methods of Systems Development. Approval of Security Design. Domain 3 — Security Compliance Management: The Cyber Domain Compliance. Domain 4 — Contingency Management: Contingency Plans. Domain 5 — Law, Ethics, and Incident Management: Information Security Laws. Security Incident Management Process. Appendix A — Answers to Domain Review Questions. Index.

    1 in stock

    £66.49

  • Official ISC2 Guide to the ISSAP CBK

    Taylor & Francis Ltd Official ISC2 Guide to the ISSAP CBK

    1 in stock

    Book SynopsisCandidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2 Guide to the ISSAP CBK, Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.Newly Enhanced Design This Guide Has It All!<Trade Review(ISC)2 is pleased to offer the Official (ISC)2® Guide to the ISSAP® CBK®, Second Edition. This book will review and deepen your knowledge of security architecture, covering each of the six domains contained in the CISSP-ISSAP® CBK®.—W. Hord Tipton, CISSP-ISSAP, CAP, CISA, Executive Director (ISC)2® Table of ContentsRequirements Analysis. Access Control. Cryptography. Physical Security. BCP/DRP. Telecommunications and Network Security

    1 in stock

    £71.24

  • Advances in Biometrics for Secure Human

    Taylor & Francis Inc Advances in Biometrics for Secure Human

    Out of stock

    Book SynopsisAlthough biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition.Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional techniques as well as novel systems that have been developed over the past few years. It presents new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Filled with comprehensive graphical and modular illustrations, the text covers applications of affective computing in biometrics, matching sketch to photograph, cryptography approaches in biometTable of ContentsSecurity and Reliability Assessment for Biometric Systems. Review of Human Recognition Based on Retinal Images. Visual Speech as Behavioral Biometric. Human Gait Signature for Biometric Authentication. Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier. On Deciding the Dynamic Periocular Boundary for Human Recognition. Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System. Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis. Case Studies and Large Scale Biometric Systems. The Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway. Biometric Identification: Device Specification and Actual Performance Considered for the Operations of the Unique Identity Authority of India.

    Out of stock

    £123.50

  • Security without Obscurity

    Taylor & Francis Ltd Security without Obscurity

    1 in stock

    Book SynopsisThe traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of Trade ReviewJeff's extensive practical experience in applying information security and his expertise in cryptographic standards makes this book a must-read for the information security professional. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity deserves a place in your reference library.—Ralph Spencer Poore, CFE, CISA, CISSP, CHS-III, PCIP, ISSA Distinguished Fellow, ISSA Honor RollHaving worked at the same consulting firm and also on a project with author J.J. Stapleton (full disclosure); I knew he was a really smart guy. In Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity, Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptography, Stapleton has had his hand in a lot of different cryptographic pies. He has been part of cryptographic accreditation committees for many different standard bodies across the globe. ... Those looking for a highly technical overview, interoperability guidance, and overall reference will find the book most rewarding. ... One of the ways Stapleton brings his broad experience to the book is in the many areas where he compares different types of cryptosystems, technologies and algorithms. This enables the reader to understand what the appropriate type of authentication is most beneficial for the specific requirement. ... For anyone looking for an authoritative text on how to fully implement cross-platform security and authentication across the enterprise, this is a valuable reference to get that job done. —Book review by Ben Rothke, writing on slashdot.orgView the full review at: http://books.slashdot.org/story/14/06/16/1245237/book-review-security-without-obscurity … the author is well qualified to assay the vital information technology field of computer network security … The text is peppered with instructive figures and tables … very clearly written …—John Maxymuk for ARBAonlineTable of ContentsIntroduction. Confidentiality. Authentication. Integrity. Nonrepudiation. Privacy. Key Management. Bibliography.

    1 in stock

    £94.99

  • An Introduction to Technology Law

    LexisNexis UK An Introduction to Technology Law

    Out of stock

    Book SynopsisThis brand new title explores the key legal issues and the complex and ever-changing inter-relationship between the law and technology. It is a must-have practical guidance resource for junior lawyers and lawyers in training who are new to technology law, and is essential reading for undergraduates and postgraduates on law courses covering the law related to technology. This brand new text is written by industry experts, practical support lawyers and key legal professionals from top UK firms and chambers, and provides a practical introductory guide to technology law as it affects the TMT (technology, media and telecommunications) industry sector. The title includes coverage of key technology law issues across software, cloud, websites, domain names, outsourcing, artificial intelligence, autonomous vehicles, blockchain, drones, media, advertising, and telecommunications.

    Out of stock

    £135.90

  • Multilevel Modeling of Secure Systems in QoPML

    CRC Press Multilevel Modeling of Secure Systems in QoPML

    Out of stock

    Book SynopsisIn order to perform effective analysis of todayâs information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Table of ContentsIntroduction to Multilevel Modeling of Secure Systems. Basis of QoP-ML. Quality of Protection Evaluation of Security Mechanisms. Advanced Communication and Energy Efficiency Modeling. Environmental Impact and Financial Costs Analysis. Reputation Analysis in QoP-ML. Security Metrics – Methodology. Tool Support. Functionality and Usability of QoP-ML. Appendix.

    Out of stock

    £80.74

  • Multilevel Security for Relational Databases

    Apple Academic Press Inc. Multilevel Security for Relational Databases

    Out of stock

    Book SynopsisSince databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational databaseillustrating the strengths and weaknesses of each model.Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models.The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class levTable of ContentsConcepts of Database Security. Basic Concept of Multilevel Database Security. Implementation of MLS /DBMS Models. Fundamentals of Information Encryption. Encryption-Based Multilevel Model for DBMS. Formal Analysis for Encryption-Based Multilevel Model for DBMS. Concurrency Control in Multilevel Relational Databases. The Instance-Based Multilevel Security Model. The Source Code.

    Out of stock

    £66.49

  • Conducting Network Penetration and Espionage in a

    Apple Academic Press Inc. Conducting Network Penetration and Espionage in a

    Out of stock

    Book SynopsisWhen it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksusing free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attacTable of ContentsWhat You Need to Know First. Attack from Christmas Island. Indirect Target Information Acquisition. Direct Target Information Acquisition. Nmap. MatLab, SimuLink, and R. Metasploit Pro. China, Syria, and the American Intelligence Community. Building a Penetration Testing Lab. Vendor Default Passwords and Default Unix Ports. Oldies but Goodies if You Have Physical Access. Order of Operations for Your Tools. Using Your iPhone as a Network Scanner.

    Out of stock

    £94.99

  • Case Studies in Intelligent Computing

    Apple Academic Press Inc. Case Studies in Intelligent Computing

    1 in stock

    Book SynopsisAlthough the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date introduction to intelligent systems.This edited book captures the state of the art in intelligent computing research through case studies that examine recent developments, developmental tools, programming, and approaches related to artificial intelligence (AI). The case studies illustrate successful machine learning and AI-based applications across various industries, including: A non-invasive and instant disease detection technique based upon machine vision through the image scanning of the eyes of subjects with conjunctivitis and jaundice Semantic orientation-based approaches for sentiment analysis An efficient and autonomous method for dTable of ContentsIntelligent Computing Case Studies. Secure Computing Case Studies.

    1 in stock

    £114.00

  • Case Studies in Secure Computing

    Apple Academic Press Inc. Case Studies in Secure Computing

    Out of stock

    Book SynopsisIn today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book: Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks Investigates various malicious activities assocTable of ContentsIntelligent Computing Case Studies. Secure Computing Case Studies.

    Out of stock

    £133.00

  • The Frugal CISO

    Apple Academic Press Inc. The Frugal CISO

    1 in stock

    Book SynopsisIf you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today's cost-cutting environment.The book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology.The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise's security operations. Focused on managing information sTable of ContentsNew Normal. Information Security Maturity Life Cycle. Reducing Complexity. Frugal Hiring. Frugal Team Management. Managing External Parties Effectively. Security Awareness: Fluff or Strategic Investment? Information Security Policies and Procedures. Is This Necessary? Understand the Budgeting Cycle. Using the Goldilocks Principle. The Hybrid (Frugal) CISO. Frugality as a Continuing Strategy for Information Security Management.

    1 in stock

    £40.84

  • Physical Security and Safety

    Taylor & Francis Inc Physical Security and Safety

    Out of stock

    Book SynopsisHow-To Guide Written By Practicing ProfessionalsPhysical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security NeedsThe book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems,Trade Review"This book is the perfect primer for both the security professional novice and those wishing for a basic refresher course on everything from best practices to basic available technologies. The book begins with a general overview of what security encompasses from an operational standpoint and expectations an organization might expect its department to deliver. The book then moves into the basic building blocks of security: assessing risk and creating a strategic mitigation plan. ... The book charts an easy-to-follow course of processes and procedures to make sure most operational bases are covered. ... The fact that the authors have laid out a logical roadmap for everything from the creation of concept through policy writing and technology makes for a clear understanding of how the security process works. By emphasizing the operations, policies, compliance, and collaborative aspects of security, they have chosen to paint a complete picture of what a successful security department needs to build on. ...This book is a must read for security beginners and veterans alike. For those just entering the industry, it provides an excellent foundation for a broad spectrum of topics from theory, operations, risk assessment, and establishing your program’s policy roadmap to what basic security technology every security pro should possess. For those who are veteran security practitioners, this book serves them well as a reference tool. The range of topics and the expertise of the writers make this a book most security professionals should add to their collections. I know I will."—Steve Lasky, Cygnus Security Media Group, USA"A great reference for those new to the field of physical security and for students in the discipline"—J. Branch Walton, Broward County Crime Commission Advisory BoardTable of ContentsPart I Security and Safety Planning. Theory of Security. Concepts of Security. Threat Decomposition. Risk Assessment and Security Surveys. Community Surveys. OSHA. Fire Safety and Security. Writing Effective Policies and Procedures. Part II Infrastructure Protection. Overall Physical Protection Program. Locks and Access Control. Intrusion Detection Systems. Security Lighting. Closed-Circuit Television Systems. Response Force. Information Technology and Security. Appendix: On-Site Survey Checklist.

    Out of stock

    £82.64

  • Analyzing and Securing Social Networks

    Apple Academic Press Inc. Analyzing and Securing Social Networks

    1 in stock

    Book SynopsisAnalyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants.The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The UniversTable of ContentsSupporting Technologies. Aspects of Analyzing and Securing Social Networks. Techniques and Tools for Social Network Analytics. Social Network Analytics and Privacy Considerations. Access Control and Inference for Social Networks. Social Media Integration and Analytics Systems. Social Media Application Systems. Secure Social Media Systems. Secure Social Media Directions.

    1 in stock

    £114.00

  • Introduction to Certificateless Cryptography

    Taylor & Francis Inc Introduction to Certificateless Cryptography

    Out of stock

    Book SynopsisAs an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand. Table of ContentsSetting the Stage. Avoiding key escrow Mathematical concepts and properties. CL-PKC without Random Oracles. Concrete constructions of CLE Generic construction of CLE. CLS secure in the standard model. CL-PKC in the Random Oracle Models. The random oracle model. CLE, CLS and CL-AKE secure in the random oracle model. CL-PKC without parings. Applications, Extensions and Related Primitives. Applications of CL-PKC. Extensions of CL-PKC. Comparisons between CL-PKC and SGC-PKC, Certificate-based PKC. Future Directions. Perspectives.

    Out of stock

    £80.74

  • Android Malware and Analysis

    Apple Academic Press Inc. Android Malware and Analysis

    1 in stock

    Book SynopsisThe rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.This tactical and practical book shows you how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how you can apply static analysis to break apart the application/malware using reverse engineering tools and techniques to recreate the actual code and algorithms used.The book presents Table of ContentsIntroduction to the Android Operating System and Threats. Malware Threats, Hoaxes, and Taxonomy. Open Source Tools. Static Analysis. Android Malware Evolution. Android Malware Trends and Reversing Tactics. Behavioral Analysis. Building Your Own Sandbox. Case Study Examples.

    1 in stock

    £56.04

  • Security in the Private Cloud

    Taylor & Francis Inc Security in the Private Cloud

    Out of stock

    Book SynopsisThis comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.Table of ContentsIntroduction to Private Cloud Security. Private Cloud Computing Essentials. Private Cloud Security Baselines. Software as a Service (SaaS). Infrastructure as a Service (Iaas). Platform as a Service (Paas). Desktop as a Service (DaaS). Software and Data Segregation Security. Achieving Security in a Private Cloud. Taking Full Responsibility for Cyber Security. Selecting the Appropriate Product. Virtual Private Cloud (VPC). The Hybrid Cloud Alternative. Identification and Privacy in Cloud. Implementing Security in a Private Cloud. Characteristics of Private Cloud Security Solutions. Transitioning Security to a Private Cloud. Secure Management of Virtualized Resources. Improving Utilization with Virtualization. Deploying an On-Premises System Center Virtual Machine Manager (VMM) Private Cloud. Monitoring Private Cloud Resources with a System Center Operations Manager. Continuous Private Cloud Monitoring. Managing a Private Cloud With a System Center Services Manager. Deploying a Hosted Amazon Virtual Private Cloud. Securing the Private Cloud. Cloud Security Assessment and Authorization. Creating a Hybrid Cloud Solution. Joint Security and Privacy Aware Protocol Design. Preparing for Disaster Recovery. Implementing a Plan to Sustain Availability. Exploiting the Private Cloud for Disaster Recovery Options. Secure Data Management within and Across Data Centers. Availability, Recovery and Auditing. Advanced Private Cloud Computing Security. Advanced Private Cloud Computing Security. Advanced Failure Detection and Prediction. Future Directions in Private Cloud Computing Security – Risks and Challenges. Private Cloud Computing with Advanced Security Services. Advanced Security Architectures for Private Cloud Computing. Appendices. Appendix A: List of Top Private Cloud Computing Security. Implementation and Deployment Companies. Appendix B: List of Private Cloud Computing Security Products. Appendix C: List of Private Cloud Computing Security Standards. Appendix D: List of Miscellaneous Private Cloud Computing Security Resources. Appendix E: Frequently Asked Questions. Appendix F: Case Studies. Appendix G: Glossary. Index.

    Out of stock

    £123.50

  • Pornography and The Criminal Justice System

    Apple Academic Press Inc. Pornography and The Criminal Justice System

    1 in stock

    Book SynopsisThis volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the status of pornography in the criminal justice system. Presenting high-level research in an accessible and organized manner, it explores a range of topics, including investigating and prosecuting a case, arguments favoring and opposing decriminalization of pornography, and relationships between pornography, mental disorders, and crime. It also examines criminal justice responses and international laws, policies, attitudes, and definitions of pornography in comparison to those of the United States.Trade Review"… an exceptionally comprehensive survey of many different dimensions of pornography. … the author identifies various court rulings, case outcomes, and such matters as police investigations, federal and state punishments, criminal justice personnel as perpetrators, and evidentiary standards on the topic. Altogether, this book provides a starting point for more in-depth exploration of various aspects of pornography. References are quite extensive and useful. Summing Up: Highly recommended. Upper-division undergraduates and above."—D. O. Friedrichs, University of ScrantonTable of ContentsPhilosophical and Jurisprudential Underpinnings. Pornography in the U. S. Criminal Justice System. Obscenity. Pornography Production and the U. S. Criminal Justice System. Children, Pornography, and the Law. Pornography and Viewers’ Crime. Relationship Between Pornography and Trafficking. Commonalities and Comorbidities Within Child Pornography. Prosecution. Illegal Pornography, Cyberspace, and Technology. The Pornography Business and Crime. Family Law and Pornography. Public Pornography. Unintended Pornography. Bestiality. Simulations. Fantasies and Free Speech. Punishments for Pornography. Crooked Members of the Criminal Justice System. Evidence. Pornography Addiction, Retribution, and Rehabilitation. International and Comparative. The Future. Index.

    1 in stock

    £75.99

  • Official ISC2 Guide to the CISSP CBK

    Apple Academic Press Inc. Official ISC2 Guide to the CISSP CBK

    5 in stock

    Book SynopsisAs a result of a rigorous, methodical process that (ISC) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC) conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today's practicing information security professionals.Refreshed technical content has been added to the official (ISC) CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced informationTable of ContentsDomain 1 — Security & Risk Management. Domain 2 — Asset Security. Domain 3 — Security Engineering. Domain 4 — Communications & Network Security. Domain 5 — Identity & Access Management. Domain 6 — Security Assessment & Testing. Domain 7 — Security Operations. Domain 8 — Security in the Software Development Life Cycle.

    5 in stock

    £62.69

  • Official (ISC)2 Guide to the HCISPP CBK

    Apple Academic Press Inc. Official (ISC)2 Guide to the HCISPP CBK

    5 in stock

    HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches.The Official (ISC)2® Guide to the HCISPPSM CBK® is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). This guide covers the diversity of the healthcare industry, the types of technologies and information flows that require various levels of protection, and the exchange of healthcare information within the industry, including relevant regulatory, compliance, and legal requirements.Numerous illustrated examples and tables are included that illustrate key concepts, frameworks, and real-life scenarios. Endorsed by the (ISC)² and compiled and reviewed by HCISPPs and (ISC)² members, this book brings together a global and thorough perspective on healthcare information security and privacy. Utilize this book as your fundamental study tool in preparation for the HCISPP certification exam.

    5 in stock

    £61.74

  • Accelerating Cloud Operations

    O'Reilly Media Accelerating Cloud Operations

    10 in stock

    Book SynopsisMany companies move workloads to the cloud only to encounter issues with legacy processes and organizational structures. How do you design new operating models for this environment? This practical book shows IT managers, CIOs, and CTOs how to address the hardest part of any cloud transformation: the people and the processes.

    10 in stock

    £33.74

  • Big Data Analytics with Applications in Insider

    CRC Press Big Data Analytics with Applications in Insider

    Out of stock

    Book SynopsisToday's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.Table of ContentsSupporting Technologies. Introduction. Data Mining Techniques. Cyber Security and Malware. Data Mining for Malware Detection. Conclusion. Stream-Based Novel Class Detection. Stream Mining. Novel Class Detection Problem. SNOD. Conclusion. Reactively Adaptive Malware. Reactively Adaptive Malware. RAMAL Design. RAMAL Implementation. SNODMAL. Introduction. SNODMAL Design. SNODMAL Implementation. SNODMAL FOR RAMAL. SNODMAL Extensions. Introduction. SNODMAL on the Cloud. SNODCAL. SNODMAL++. Conclusion. Summary and Directions. References. Appendix A: Data Management Systems. Appendix B: Malware Products.

    Out of stock

    £94.99

  • RealWorld Electronic Voting

    Taylor & Francis Inc RealWorld Electronic Voting

    Out of stock

    Book SynopsisReal-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting.This book explores recent innovations in both poll-site and remote voting systems and their application throughout the world. The requirements of elections are analysed, the available tools and technologies are described, and a variety of modern systems are presented in detail together with discussions of deployments. This is an invaluable resource for election professionals, researchers and policy makers alike. Key Features: Reviews both technical and social aspects of e-voting Covers e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting Designed for government elecTable of ContentsSECTION I: SETTING THE SCENE 1 Software Independence Revisited - Ronald L. Rivest and Madars Virza 2 Guidelines for Trialling E-voting in National Elections - Ben Goldsmith SECTION II: REAL-WORLD E-VOTING IN NATIONAL ELECTIONS 3 Overview of Current State of E-votingWorld-wide - Carlos Vegas and Jordi Barrat 4 Electoral Systems Used around the World - Siamak F. Shahandashti 5 E-voting in Norway - Kristian Gjøsteen 6 E-voting in Estonia - Dylan Clarke and Tarvi Martens 7 Practical Attacks on Real-world E-voting - J. Alex Halderman SECTION III: E2E VOTING SYSTEM AND REAL-WORLD APPLICATIONS 8 An Overview of End-to-End Verifiable Voting Systems - Syed Taha Ali and Judy Murray 9 Theoretical Attacks on E2E Voting Systems - Peter Hyun-Jeen Lee and Siamak F. Shahandashti 10 The Scantegrity Voting System and its Use in the Takoma Park Elections - Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora, John Wittrock, and Filip Zagórski 11 Internet voting with Helios - Olivier Pereira 12 Prêt à Voter - the Evolution of the Species - Peter Y A Ryan, Steve Schneider, and Vanessa Teague 13 DRE-i and Self-Enforcing E-Voting - Feng Hao 14 STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System - Susan Bell, Josh Benaloh, Michael D. Byrne, Dana DeBeauvoir, Bryce Eakin, Gail Fisher, Philip Kortum, Neal McBurnett, Julian Montoya, Michelle Parker, Olivier Pereira, Philip B. Stark, Dan S. Wallach, and Michael Winn

    Out of stock

    £104.50

  • AntiSpam Techniques Based on Artificial Immune

    Taylor & Francis Inc AntiSpam Techniques Based on Artificial Immune

    Out of stock

    Book SynopsisEmail has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial immune system (AIS) to identify and filter spam. It provides a single source of all anti-spam models and algorithms based on the AIS that have been proposed by the author for the past decade in various journals and conferences.Inspired by the biological immune system, the AIS is an adaptive system based on theoretical immunology and observed immune functions, principles, and models for problem solving. Among the variety of anti-spam techniques, the AIS has been highly effective and is becoming one of the most important methods to filter spam. The book also focuses on several key topics related to the AIS, including:Extraction methods inspired by various immune principlesTable of ContentsAnti-Spam Technologies. Artificial Immune System. Term Space Partition-Based Feature Construction Approach. Immune Concentration-Based Feature Construction Approach. Local Concentration-Based Feature Extraction Approach. Multi-Resolution Concentration-Based Feature Construction Approach. Adaptive Concentration Selection Model. Variable Length Concentration-Based Feature Construction Method. Parameter Optimization of Concentration-Based Feature Construction Approaches. Immune Danger Theory-Based Ensemble Method. Immune Danger Zone Principle-Based Dynamic Learning Method. Immune-Based Dynamic Updating Algorithm. AIS-Based Spam Filtering System and Implementation.

    Out of stock

    £144.00

  • Practical Cloud Security

    Taylor & Francis Inc Practical Cloud Security

    1 in stock

    Book SynopsisMelvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks.  Key Features Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies Provides insight into the interaction and croTable of Contents Practical Cloud Security

    1 in stock

    £71.24

  • Cyber Security for Industrial Control Systems

    Taylor & Francis Inc Cyber Security for Industrial Control Systems

    Out of stock

    Book SynopsisCyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts.The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios.The authors provide detailed dTable of ContentsSECURE STATE ESTIMATION. A Game—Theoretic Approach to Jamming Attacks. Secure State Estimation against Stealthy Attack. Secure State Estimation in Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack Policy against Wireless Systems. Specification-Based FDI Detection Technique. Resilient Control System Hierarchical Architectures. Topology Control in Secure WSNs. Resilient Distributed Control in Energy CPSs. SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of Operator-Vehicle Networks. Privacy-Preserving Data Access Control.

    Out of stock

    £156.75

  • Protecting Mobile Networks and Devices

    Taylor & Francis Inc Protecting Mobile Networks and Devices

    Out of stock

    Book SynopsisThis book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.Table of ContentsIntroduction to Mobile Malware. Visual Payloads. Timeline of Mobile Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of Mobile Malware. Debugging and Disassembling of Mobile Malicious Code. Mobile Malware Mitigation Measures.

    Out of stock

    £66.49

  • Biometrics in a Data Driven World

    Taylor & Francis Inc Biometrics in a Data Driven World

    1 in stock

    Book SynopsisBiometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics.The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emergingTable of ContentsIntroduction to Biometric Authentication. Challenges in Biometric Systems. Emerging trends and new opportunities in Biometrics. Biometrics in the mobile world. Biometric authentication techniques in the mobile platform. Case Studies of real-world mobile biometric systems. Biometrics in wearable technology and healthcare applications. Biometrics in Social Networks. Biometrics in Gaming Technologies. Biometrics in homeland security. Computational issues in biometrics. New directions in Biometrics research: What does the future hold?

    1 in stock

    £117.00

  • Operational Assessment of IT

    Taylor & Francis Inc Operational Assessment of IT

    Out of stock

    Book SynopsisOperational Assessment of IT presents ideas and concepts of optimization designed to improve an organization's business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks, resource programs, or infrastructure, the book focuses on organizational processes. Throughout the book, the author presents concerns and environments encountered throughout his career to demonstrate issues and explain how you, too, can successfully implement the tools presented in the book.The assessment process reviews the economics as well as the effectiveness and efficiency of the process. Whether your organization is profit-based, not-for-profit, or even governmental, you cannot provide services or products at a continuous loss. For an operational assessment to be of value, the ultimate goal must be to insure that the business unit process is effective and effiTrade ReviewWhen I first received this book for review, I was a bit nervous. I am not an auditor, and have never been one. It is true that I have participated in hundreds of audits across different industries and disciplines, as both a customer and much more frequently, as an advisor, but I never had to put my name to the bottom of an attestation (except, I suppose, for a few PCI self-assessment questionnaires). In short, I was concerned that I would not be able to properly grasp it, and thus fail to do it justice. By the time I was done, I found myself with the same concern, but this time, coming from a completely different angle. Because Steve’s book is truly a delight. I have worked with hundreds of auditors, and only a couple of them have ever shown the scope and breadth of experience, the desire to go beyond following rote process, and the sheer interest in staying true to the purpose of an audit – any audit – that Mr. Katzman exhibits in his book. Steve’s personal stories shine through, and really help in framing the conversation. The little quips he embeds throughout his writing made me chuckle repeatedly, certainly not what I expected from a book about what is ultimately a rather dry subject matter. The planning chapter alone is worth the price of entry, as first and foremost it does such a great job at reminding all of us why audits exist in the first place. For me, this work provided a great insight into the mind of an auditor, in a way that I never quite grasped before. That is undoubtedly going to help me in future audits. Considering the way Steve seamlessly transitions between the client and auditor viewpoints, if you are an auditor (the stated target audience for this book), then I cannot imagine how it would fail to help in a mirrored fashion.I find it fitting to end this review by borrowing Steve’s own ending words from the book: "Stay well, stay happy, and stay productive". -- Barak Engel, CISO and author, Why CISOs Fail – The Missing Link in Security Management and How to Fix ItWhen I first received this book for review, I was a bit nervous. I am not an auditor, and have never been one. It is true that I have participated in hundreds of audits across different industries and disciplines, as both a customer and much more frequently, as an advisor, but I never had to put my name to the bottom of an attestation (except, I suppose, for a few PCI self-assessment questionnaires). In short, I was concerned that I would not be able to properly grasp it, and thus fail to do it justice. By the time I was done, I found myself with the same concern, but this time, coming from a completely different angle. Because Steve’s book is truly a delight. I have worked with hundreds of auditors, and only a couple of them have ever shown the scope and breadth of experience, the desire to go beyond following rote process, and the sheer interest in staying true to the purpose of an audit – any audit – that Mr. Katzman exhibits in his book.Steve’s personal stories shine through, and really help in framing the conversation. The little quips he embeds throughout his writing made me chuckle repeatedly, certainly not what I expected from a book about what is ultimately a rather dry subject matter. The planning chapter alone is worth the price of entry, as first and foremost it does such a great job at reminding all of us why audits exist in the first place. For me, this work provided a great insight into the mind of an auditor, in a way that I never quite grasped before. That is undoubtedly going to help me in future audits. Considering the way Steve seamlessly transitions between the client and auditor viewpoints, if you are an auditor (the stated target audience for this book), then I cannot imagine how it would fail to help in a mirrored fashionI find it fitting to end this review by borrowing Steve’s own ending words from the book: Stay well, stay happy, and stay productive". -- Barak Engel, CISO and author, Why CISOs Fail – The Missing Link in Security Management and How to Fix ItTable of ContentsPRELUDE. Introduction. GOALS. The Organization. OPERATIONAL ASSESSMENTS. Operational Auditing. Operational Assessment Planning. Operational Assessment Fieldwork. PUTTING IT ALL TOGETHER. Assessment Reporting. IT and COBIT. Epilogue. Appendices.

    Out of stock

    £123.50

  • A Guide to the National Initiative for

    Taylor & Francis Inc A Guide to the National Initiative for

    1 in stock

    Book SynopsisA Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NISTâs cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSFâs identification, protection, defense, response, or recovery functions are being carried out properly.The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first booTable of ContentsIntroduction: Defining the Cybersecurity Workforce. Creating Standard Competencies for Cybersecurity Work. Implementing Standard Cybersecurity. Securely Provision General Knowledge Area. Operate and Maintain General Knowledge Area. Protect and Defend General Knowledge Area. Investigate General Knowledge Area. Collect and Operate and Analyze General Knowledge Areas. Oversee and Govern General Knowledge Area. Applying the NICE Cybersecurity Workforce Model to the Real World.

    1 in stock

    £75.99

  • Fundamentals of Medical Practice Investigation

    Taylor & Francis Inc Fundamentals of Medical Practice Investigation

    Out of stock

    Book SynopsisFundamentals of Medical Practice Investigation fills an important gap in the resources for criminal investigators. Appropriate for novice medical investigators as well as seasoned investigators looking to sharpen their skills, this book unites step-by-step fundamentals with up-to-date research reviews of critical issues in the field, including sexual misconduct, patient abuse, drug use among medical practitioners, and unethical or illegal prescription practices. An essential tool for law enforcement and other criminal justice professionals, Fundamentals of Medical Practice Investigation will improve the quality of all types of medical investigation. Table of ContentsIntroduction.Medicine and the Investigation Thereof.Professional Ethics. The Regulation of the Practice of Medicine.The Investigative Process.Witness Interviews and Subject Interviews.The Medical Record. Evidence and Evidence Handling.Standard of Care Investigations.Controlled Substance Prescribing Investigations.Professional Sexual Misconduct Investigations.Mental and Physical Impairment Investigations.Investigating Healthcare Fraud.Other Investigative Concerns.Investigating the Unlicensed Practice of Medicine and Complementary and Alternative Medicine.The Report of Investigation.The Trial and Hearing Process and the Investigator as a Witness.References.Appendix.

    Out of stock

    £128.25

  • Private Investigation and Homeland Security

    Taylor & Francis Inc Private Investigation and Homeland Security

    1 in stock

    Book SynopsisThe threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.Table of ContentsAcknowledgements and DedicationAbout the AuthorChapter One: Historical Overview of Private InvestigationChapter Two: Private Investigation Licensing RequirementChapter Three: Private Investigation and Legal IssuesChapter Four: Establishing a Professional Private Investigative BusinessChapter Five: Conducting Investigations Related to Homeland Security Chapter Six: Other Private Investigation Services Related to Homeland SecurityChapter Seven: Private Investigative Agency Security Services Chapter Eight: The Future of Private Investigation and Homeland SecurityAppendix I: State Licensing for Private InvestigatorsAppendix II: Professional International and National Private Investigative and Intelligence Organizations and PublicationsAppendix III: Professional Private Investigation CertificationsAppendix IV: Private Investigative Agency Contract Security Force ChecklistAppendix V: Pennsylvania Private Detective ActAppendix VI: Pennsylvania Lethal Weapons Training ActAppendix VII: Virginia Private Investigator Training Course OutlineAppendix VIII: New York Security Guard TrainingIndex

    1 in stock

    £128.25

  • Essentials of Modeling and Analytics

    Taylor & Francis Inc Essentials of Modeling and Analytics

    Out of stock

    Book SynopsisEssentials of Modeling and Analytics illustrates how and why analytics can be used effectively by loss prevention staff. The book offers an in-depth overview of analytics, first illustrating how analytics are used to solve business problems, then exploring the tools and training that staff will need in order to engage solutions. The text also covers big data analytical tools and discusses if and when they are right for retail loss prevention professionals, and illustrates how to use analytics to test the effectiveness of loss prevention initiatives. Ideal for loss prevention personnel on all levels, this book can also be used for loss prevention analytics courses. Essentials of Modeling and Analytics was named one of the best Analytics books of all time by BookAuthority, one of the world''s leading independent sites for nonfiction book recommendations.Table of ContentsChapter 1: IntroductionChapter 2: Analytics in Loss Prevention TodayChapter 3: Tools, Staffing, and Training Considerations for Loss Prevention AnalyticsChapter 4: Data ExplorationChapter 5: Analytical Methods for Loss PreventionChapter 6: Creating a Business Case with AnalyticsChapter 7: Trends in Future Loss Prevention Analytics and Closing Thoughts

    Out of stock

    £128.25

  • Bloomsbury Publishing PLC Commentary on the Digital Services Act

    Out of stock

    Book SynopsisThe Digital Services Act provides a framework for all categories of content, products, services and activities on intermediary services. It builds on existing liability rules and is directly applicable to all intermediary services provided to residents of the European Union, irrespective of the place of establishment of the service provider. In this commentary, a team of experts work meticulously, article-by-article, to set out precisely the obligations and liabilities that it gives rise to. All lawyers in the field of digital services will find this invaluable.

    Out of stock

    £237.50

  • From Capital to Commons: Exploring the Promise of

    Bristol University Press From Capital to Commons: Exploring the Promise of

    15 in stock

    Book SynopsisHelps the reader gain a bigger-picture understanding of the growing counter-capitalist discourse; Offers concrete examples to offer valuable insights into the two-sided nature of technology and its role in fomenting political/economic change; Showcases how the digital commons both relies on, and increasingly shapes, the material realm of raw materials, infrastructure, and manufacturing.Table of ContentsIntroduction PART I: Contemporary Capitalism and the Promise of the Digital Revolution 1. Theorizing Capitalism and its Demise 2. The Digital Commons' Elusive Potential 3. Taking Back the Interest PART II: The Material Economy and the Commons 4. Democratizing Infrastructure 5. The Promise of 'Design Global, Manufacture Local' 6. Contending With the Limits of Our Natural World PART III: Money and Value 7. Coping With Money's Monopoly on Value 8. Reinventing Money's Role in the Economy PART IV: In Pursuit of a Post-Capitalist Future 9. Compeerists of the World Unite! 10. A Compeerist Society Conclusion

    15 in stock

    £77.34

  • Netlife: Internet Citizens & Their Communities

    Nova Science Publishers Inc Netlife: Internet Citizens & Their Communities

    1 in stock

    Book Synopsis

    1 in stock

    £45.04

  • Enterprise Security Architecture: A

    Taylor & Francis Ltd Enterprise Security Architecture: A

    2 in stock

    Book SynopsisSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a framework for developing and maintaining a system that is proactive. The book is based around the SABSA layered framework. It provides a structured approach to the steps and processes involved in developing security architectures. It also considers how some of the major business issues likely to be encountered can be resolved.Table of ContentsEnterprise Security Architecture

    2 in stock

    £99.75

  • Internet Gambling: Overview of Federal Criminal

    Nova Science Publishers Inc Internet Gambling: Overview of Federal Criminal

    Out of stock

    Book SynopsisThis book presents a review of the federal criminal statutes implicated by conducting illegal gambling using the Internet. It also discusses some of the constitutional and practical difficulties associated with prosecuting illegal Internet gambling and closes with a summary of the proposed Internet Gambling Prohibition Act (S.474). Gambling is primarily a matter of state law, reinforced by federal law in instances where the presence of an interstate or foreign feature might otherwise frustrate the enforcement policies of state law. State officials and others have expressed concern that the Internet may be used to conduct illegal gambling. Illicit Internet gambling implicates six federal criminal statutes. It is a federal crime to (1) conduct an illegal gambling business, 18 USC 1955; (2) use the telephone or telecommunications to conduct an illegal business; (3) use the facilities of interstate commerce to facilitate conducting an illegal gambling operation; (4) commit a related series of these gambling crimes to acquire or operate an interstate commercial enterprise; (5) launder the proceeds from an illegal gambling business or to plow them back into the business; or (6) spend over $10,000 of the proceeds from an illegal gambling operation at any one time or place. Although prosecution of illegal Internet gambling will likely encounter constitutional challenges, practical difficulties imposed by offshore operations, encryption, remailers and the like will probably pose a more substantial obstacle.

    Out of stock

    £23.24

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account