Gives the most up-to-date planning and risk management techniques for business continuity and disaster recovery (BCDR). Provides new case studies in several business areas, along with a review of high availability and information security in healthcare IT.
Actionable guidance and expert perspective for real-world cybersecurity. Provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs.
Presents studies on trends, developments, and methods on information technology advancements through network and communication technology. Brings together integrated approaches for communication technology and usage for web and IT advancements.
Provides focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Authored by leading experts in the field and addresses the immediate and long-term challenges of the field.
Provides innovative insights into the impact of m-commerce, m-learning, and m-knowledge management technologies and the risks their usage has on different organizations, such as online stores, higher education institutions, multinational corporations, health providers, and more. Highlights topics including cyberterrorism, smart security, and cyber ethics.
Discusses security and optimization of computer networks for use in various disciplines and fields. Includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
Details how to use network security monitoring (NSM) to add a robust layer of protection around networks with no prior experience required. Teaches how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.
Draws on the experience of industry experts and academic research to gain insight into information security issues related to human behavior, from both end-users' and security professionals' perspectives; provide a set of recommendations to support the security professional's decision-making process, and to improve the culture and find the balance between security and productivity; give advice on aligning a security program with wider organizational objectives; and manage and communicate these changes within an organization.
Comprehensive resource on technological advancements in designing secure wireless networks and secure transmission of data, voice and video over wireless networks and other innovations. Features coverage across a range of relevant topics. Ideal source for network designers, industries, and others involved in designing and implementing security and wireless networks and applications.
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.
Teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. Explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management.
Reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation.