E-books on Cybersecurity

Download them from the IEEE Xplore Digital Library

13 March 2015

Here’s a sample of IEEE e-books that focus on cybersecurity. To view the books, log in to the IEEE Xplore Digital Library and click on “Books & eBooks” in the left-hand navigation menu. You can then browse or search by title and download a PDF of an excerpt or of selected chapters. To order books, visit Wiley.com.

  • Security Management of Next Generation Telecommunications Networks and Services

    BY STUART JACOBS (2014)

    Discusses how to improve the security of next-generation enterprise and service-provider networks and includes virtualized programs that users may access from a diverse array of devices and locations. The book reviews authentication, authorization, risk management, and other key security concepts, and presents approaches to encryption and associated credentials management and control.

  • Reliability and Availability of Cloud Computing

    BY ERIC BAUER AND RANDEE ADAMS (2012)

    A look at how to develop and deploy applications that are virtualized or deployed in a cloud. Chapters cover reliability risks, maximizing service availability, and meeting customers’ expectations.

  • Computer, Network, Software, and Hardware Engineering With Applications

    BY NORMAN F. SCHNEIDEWIND (2012)

    This manual on designing and deploying a seamless and secure computer-based system provides a step-by-step approach to analyzing performance, reliability, and availability, and it explains how to evaluate and minimize risk when deploying integrated systems.

  • Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

    BY STUART JACOBS (2011)

    A resource on secure design, deployment, and decommissioning that helps systems engineers address security concerns by ensuring access only by authorized users. This guide considers the life cycle of security systems and goes beyond technical requirements, taking into account an organization’s needs such as legal and regulatory requirements.

  • Mobile Communication Systems and Security

    BY MAN YOUNG RHEE (2009)

    Provides an understanding of major cellular air-interface technologies and their security layer techniques. The author, a leader in information security, covers the development of wireless mobile communications while presenting ways to address potential problems.

Learn More