The Effect of Encryption on Lawful Access to Communications and Data

The Internet has become central to global economic activity, politics, and security, and the security environment has changed recently, as we face much more aggressive state actors in espionage. Terrorists and criminals find creative ways to leverage the latest technologies to evade security and privacy protections, but there may be technical and policy solutions that can balance national security and public safety with protection of...

Police and Society in Brazil

In Brazil, where crime is closely associated with social inequality and failure of the criminal justice system, the police are considered by most to be corrupt, inefficient, and violent, especially when occupying poor areas, and they lack the widespread legitimacy enjoyed by police forces in many nations in the northern hemisphere. This text covers hot-button issues like urban pacification squads, gangs, and drugs, as well as practic...

Countering New(est) Terrorism

How should we analyze and assess new terrorist behaviors? What are the particular risks and challenges from new terrorism? Should we negotiate with terrorists, and, if so, how? When should we use force against terrorists? Countering New(est) Terrorism: Hostage-Taking, Kidnapping, and Active Violence―Assessing, Negotiating, and Assaulting improves our knowledge of new terrorist behaviors, and our skills in responding to such attacks. ...

Principles of Information Security

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on international...

Guidelines for Roving Security Inspections in Public Venues Using Explosives Detection Dogs

Guidelines for Roving Security Inspections in Public Venues Using Explosives Detection Dogs grew out of the March 2004 synchronized bombing attack of commuter trains in Madrid, Spain. These guidelines were developed by the T&DI Task Committee on Roving Security Inspections following a teleconference sponsored by the Transportation and Development Institute of ASCE, the Transit Standards Consortium, and the Infrastructure Security...

Security Solutions for Hyperconnectivity and the Internet of Things

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and t...

Security and Quality of Service in Ad Hoc Wireless Networks

Ensuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the requirements and solutions necessary to tackle them. QoS in relation to ad hoc networks is cove...

Introductory Criminology

Introductory Criminology: The Study of Risky Situations takes a unique and intuitive approach to teaching and learning criminology. Avoiding the fragmentation of ideas commonly found in criminology textbooks, Marcus Felson and Mary A. Eckert develop a more practical, readable structure that engages the reader and enhances their understanding of the material. Their descriptive categories, simultaneously broad and realistic, serve bett...

La sécurité informatique dans la petite entreprise - Etat de l'art et Bonnes Pratiques

Ce livre sur la sécurité informatique dans la petite entreprise (PME) s'adresse aux administrateurs systèmes et réseaux et plus généralement à toute personne appelée à participer à la gestion de l'outil informatique dans ce contexte (chef d'entreprise, formateur…). L'auteur identifie les risques qui rendent l'entreprise vulnérable : menaces externes (Internet) ou internes, logiciels malveillants et attaques affectant le système d'inf...