For more than 50 years, Auerbach has been publishing for IT professionals. We offer a wide range of publications—both in print and electronic. Auerbach's complete catalog of books features titles in these categories:

Contact Auerbach Publications

Contact John Wyzalek ( about questions about, as well as new book proposals on, books on Project Management, Process Improvement, Database, IT, Software Development and Engineering, and Operations Management.

Contact Rich O'Hanley ( about questions about, as well as new book proposals on, books on Information Security, Telecommunications, and Networking..

On-Line Resources

Read articles from the archives of IT Today, Auerbach's free newsletter.

Make your team a high-performance team! This free newsletter shows you how to do improvement.

Doing its part to make cyberspace safer, InfoSec Today has the latest from the everchanging world of information security.

A blog of news, research, and trends on all things lean.

CRCnetBASE offers on-line all of Auerbach's books, references, and encyclopedias. E-books, licenses, and subscriptions available from CRC Press.


Featured New Book

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment.

Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security:

  • Computer networks: technologies, routing protocols, and Internet architecture
  • Information and network security: concepts, challenges, and mechanisms
  • System vulnerability levels: network, operating system, and applications

The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it.

The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

    New Books from Auerbach

Honeypots and Routers: Collecting Internet Attacks The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Citie Anti-Spam Techniques Based on Artificial Immune System Securing an IT Organization through Governance, Risk Management, and Audit

Cyber Physical Systems: Architectures, Protocols and Applications Leading the Internal Audit Function Securing Cyber-Physical Systems Mathematical Foundations of Public Key Cryptography

Cyber-Physical Systems: From Theory to Practice Global Information Warfare: The New Digital Battlefield, Second Edition The Complete Guide for CPP Examination Preparation, 2nd Edition Multilevel Modeling of Secure Systems in QoP-ML

Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare Web Security: A WhiteHat Perspective Data Privacy for the Smart Grid

Official (ISC)² Guide to the CISSP CBK, Fourth Edition Practical Cryptography: Algorithms and Implementations Using C++ Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture Android Malware and Analysis

Multilevel Security for Relational Databases The Official (ISC)2 ® Guide to the HCISPPSM CBK® Case Studies in Secure Computing: Achievements and Trends Secure Data Provenance and Inference Control with Semantic Web

Ethical Hacking and Penetration Testing Guide Official (ISC)2® Guide to the CCFP CBK PCI Compliance: The Definitive Guide Conducting Network Penetration and Espionage in a Global Environment

The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity Security for Service Oriented Architectures Anonymous Communication Networks: Protecting Privacy on the Web

Security for Multihop Wireless Networks Intrusion Detection in Wireless Ad-Hoc Networks The State of the Art in Intrusion Prevention and Detection Image Encryption: A Communication Perspective

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud Advances in Biometrics for Secure Human Authentication and Recognition Core Software Security: Security at the Source Intrusion Detection Networks: A Key to Collaborative Security

Developing and Securing the Cloud Physical Layer Security in Wireless Communications Information Security Fundamentals, Second Edition Responsive Security: Be Ready to Be Secure

Information Security Management Handbook, 2013 CD-ROM Edition Official (ISC)2® Guide to the ISSAP® CBK, Second Edition Expert Bytes: Computer Expertise in Forensic Documents—Players, Needs, Resources and Pitfalls Information Security Management Handbook, Sixth Edition, Volume 7

Official (ISC)2 Guide to the CSSLP CBK, Second Edition Security and Privacy in Smart Grids Iris Biometric Model for Secured Network Access Conflict and Cooperation in Cyberspace: The Challenge to National Security

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks Android Security: Attacks and Defenses Information Security Policy Development for Compliance Securing Cloud and Mobility: A Practitioner's Guide

The Complete Book of Data Anonymization: From Planning to Implementation PRAGMATIC Security Metrics: Applying Metametrics to Information Security Official (ISC)2 Guide to the CISSP CBK, Third Edition New Directions of Modern Cryptography

Network Attacks and Defenses: A Hands-on Approach Security for Wireless Sensor Networks using Identity-Based Cryptography Digital Forensics for Handheld Devices Information Security Management Handbook, 2012 CD-ROM

Official (ISC)2® Guide to the CAP® CBK®, Second Edition Information Technology Control and Audit, Fourth Edition Electronically Stored Information The 7 Qualities of Highly Secure Software

Noiseless Steganography: The Key to Covert Communications Information Security Management Handbook, Sixth Edition, Volume 6 Cybersecurity: Public Sector Threats and Responses Information Security Governance Simplified: From the Boardroom to the Keyboard

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Asset Protection through Security Awareness Security De-Engineering: Solving the Problems in Information Risk Management Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits Data Mining Tools for Malware Detection Information Security Management Handbook, Sixth Edition, Volume 5 Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Introduction to Security and Network Forensics Machine Learning Forensics for Law Enforcement, Security, and Intelligence Official (ISC)2 Guide to the CSSLP A Guide to Information Security Compliance for Financial Services

Introduction to Cryptography with Open-Source Software The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition Data Mining and Machine Learning in Cybersecurity Practical Risk Management for the CIO

Official (ISC)2® Guide to the ISSMP® CBK® Security Patch Management FISMA Principles and Best Practices: Beyond Compliance Cyber Criminology: Exploring Internet Crimes and Criminal Behavior

Secure Semantic Service-Oriented Systems Cyber Security Essentials Official (ISC)2 Guide to the SSCP CBK, Second Edition Encyclopedia of Information Assurance

Adaptive Security Management Architecture Security Strategy: From Requirements to Reality Official (ISC)2® Guide to the ISSAP® CBK Managing an Information Security and Privacy Awareness Training Program, Second Edition

Information Security Management Handbook, Sixth Edition, Volume 4 Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World Secure and Resilient Software Development Information Security Risk Analysis, Third Edition

Official (ISC)2 Guide to the CISSP CBK, Second Edition Information Security Management Handbook, 2010 CD-ROM Edition Intelligent Video Surveillance: Systems and Technology The Executive MBA in Information Security

Building an Enterprise-Wide Business Continuity Program Vulnerability Management Data Protection: Governance, Risk Management, and Compliance Security of Mobile Communications

Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats Understanding and Applying Cryptography and Data Security Information Security Management Handbook, Sixth Edition, Volume 3 Cyber Fraud: Tactics, Techniques and Procedures

Security in RFID and Sensor Networks Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement HOWTO Secure and Audit Oracle 10g and 11g Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics and Information Sharing Technologies

Intelligent Network Video: Understanding Modern Video Surveillance Systems Architecting Secure Software Systems Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant

Business Resumption Planning, Second Edition How to Complete a Risk Assessment in 5 Days or Less Information Technology Control and Audit, Third Edition IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Security Software Development: Assessing and Managing Security Risks Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies Multimedia Content Encryption: Techniques and Applications Security in Wireless Mesh Networks

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet Information Assurance Architecture Building an Effective Information Security Policy Architecture Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Second Edition

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition Information Security Management Handbook, Sixth Edition, Volume 2 Digital Privacy: Theory, Technologies, and Practices Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition

Software Deployment, Updating, and Patching Data-driven Block Ciphers for Fast Telecommunication Systems Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks How to Achieve 27001 Certification: An Example of Applied Compliance Management

Mechanics of User Identification and Authentication: Fundamentals of Identity Management Testing Code Security The Practical Guide to HIPAA Privacy and Security Compliance Official (ISC)2 Guide to the SSCP CBK

Security in Distributed, Grid, Mobile, and Pervasive Computing Computer Forensics: Evidence Collection and Management Wireless Crime and Forensic Investigation Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI

802.1X Port-Based Authentication Complete Guide to CISM Certification Official (ISC)2 Guide to the CISSP CBK IT Security Governance Guidebook with Security Program Metrics on CD-ROM

Practical Hacking Techniques and Countermeasures Information Security Cost Management Security in Sensor Networks Information Security: Design, Implementation, Measurement, and Compliance

The Complete Guide for CPP Examination Preparation Securing Converged IP Networks Multimedia Encryption and Authentication Techniques and Applications Multimedia Watermarking Techniques and Applications

Audit and Trace Log Management: Consolidation and Analysis The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Wireless Security Handbook Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK

The Ethical Hack: A Framework for Business Value Penetration Testing Enhancing Computer Security with Smart Technology Guide to Optimal Operational Risk and BASEL II Official (ISC)2 Guide to the CISSP-ISSEP CBK

The CISO Handbook: A Practical Guide to Securing Your Company Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition CISO Leadership: Essential Principles for Success Database and Applications Security: Integrating Information Security and Data Management

Managing an Information Security and Privacy Awareness and Training Program Assessing and Managing Security Risk in IT Systems: A Structured Methodology Curing the Patch Management Headache Cyber Crime Investigator's Field Guide, Second Edition

Certain names and logos on this page and others may constitute trademarks, servicemarks, or tradenames of Taylor & Francis LLC. Copyright © 2008—2015 Taylor & Francis LLC. All rights reserved.