Information Security Books

Featured Book

Vulnerability Management

Park Foreman

Vulnerability management proactively prevents the exploitation of IT security gaps and weaknesses that exist particularly within a larger organization. This book demonstrates how prevention can reduce the potential for exploitation and shows that it takes considerably less time and resources to manage potential weaknesses, than to clean up after a violation. Written by a leading expert in IT security, this volume provides guidance for creating a vulnerability management program in a large, globally distributed company. It covers areas often neglected or falsely appearing secure. The text includes checklists and details the activities that constitute successful management.

The Complete Auerbach Catalog

The complete Auerbach Online Catalog features titles
in these categories:

Offering the information you need to secure your information, systems, and sites, this online library contains the work of seasoned experts who discuss preferred software packages and models, as well as give step-by-step advice on how to maximize talent, processes, and resources to produce a positive bottom line.

Information Security Books from Auerbach

The Executive MBA in Information Security Information Security Management Handbook, 2009 CD-ROM Edition Building an Enterprise-Wide Business Continuity Program Data Protection: Governance, Risk Management, and Compliance Security of Mobile Communications

Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats Understanding and Applying Cryptography and Data Security Information Security Management Handbook, Sixth Edition, Volume 3 Cyber Fraud: Tactics, Techniques and Procedures Security in RFID and Sensor Networks

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement HOWTO Secure and Audit Oracle 10g and 11g Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies Architecting Secure Software Systems Intelligent Network Video: Understanding Modern Video Surveillance Systems

Architecting Secure Software Systems Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives Business Resumption Planning, Second Edition How to Complete a Risk Assessment in 5 Days or Less

Information Technology Control and Audit, Third Edition IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement Security Software Development: Assessing and Managing Security Risks Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies Multimedia Content Encryption: Techniques and Applications

Security in Wireless Mesh Networks Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet Information Assurance Architecture Building an Effective Information Security Policy Architecture Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Second Edition

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition Information Security Management Handbook, Sixth Edition, Volume 2 Digital Privacy: Theory, Technologies, and Practices Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition Software Deployment, Updating, and Patching

Data-driven Block Ciphers for Fast Telecommunication Systems Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks How to Achieve 27001 Certification: An Example of Applied Compliance Management Mechanics of User Identification and Authentication: Fundamentals of Identity Management Testing Code Security

The Practical Guide to HIPAA Privacy and Security Compliance Official (ISC)2 Guide to the SSCP CBK Security in Distributed, Grid, Mobile, and Pervasive Computing Computer Forensics: Evidence Collection and Management Wireless Crime and Forensic Investigation

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI 802.1X Port-Based Authentication Complete Guide to CISM Certification Official (ISC)2 Guide to the CISSP CBK IT Security Governance Guidebook with Security Program Metrics on CD-ROM

Practical Hacking Techniques and Countermeasures Information Security Cost Management Security in Sensor Networks Information Security: Design, Implementation, Measurement, and Compliance The Complete Guide for CPP Examination Preparation

Securing Converged IP Networks Multimedia Encryption and Authentication Techniques and Applications Multimedia Watermarking Techniques and Applications Audit and Trace Log Management: Consolidation and Analysis The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments

Wireless Security Handbook Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK The Ethical Hack: A Framework for Business Value Penetration TestingEnhancing Computer Security with Smart Technology Guide to Optimal Operational Risk and BASEL II

Official (ISC)2 Guide to the CISSP-ISSEP CBK The CISO Handbook: A Practical Guide to Securing Your Company Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition CISO Leadership: Essential Principles for Success Database and Applications Security: Integrating Information Security and Data Management

Managing an Information Security and Privacy Awareness and Training Program Assessing and Managing Security Risk in IT Systems: A Structured Methodology Curing the Patch Management Headache Cyber Crime Investigator's Field Guide, Second Edition A Practical Guide to Security Assessments

Certain names and logos on this page and others may constitute trademarks, servicemarks, or tradenames of Taylor & Francis LLC.
Copyright © 2008—2009 Taylor & Francis LLC. All rights reserved.