Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measu
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-ba
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and ed
This handbook offers insights into how science (physical, natural and social) and technology can support new developments to manage the complexity resident with