Handbook of research on information security and assurance
Título:
Handbook of research on information security and assurance
ISBN:
9781599048567
PRODUCTION_INFO:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Descripción física:
electronic texts (xxvii, 557 p. : ill.) : digital files.
Contenido:
Ransomware: A New Cyber Hijacking Threat to Enterprise / Xin Luo, Qinyu Liao -- E-Commerce: The Benefits Security Risks, and Countermeasures / Joon S. Park, Jillian K. Lando, -- Information Warfare: Survival of the Fittest / Pamela Ajoku -- Evolution of Enterprise Security Federation / Gaeil An, Joon S. Park -- A Holistic Approach to Information Security Assurance and Risk Management in an Enterprise / Roy Ng -- An Integrative Framework for the Study of Information Security Management Research / John D' Arcy, Anat Hovav -- Information Systems Risk Management: An Audit and Control Approach / Aditya Ponnam, Britta Harrison, Ed Watson -- Distributed Denial of Service Attacks in Networks / Udaya Kiran Tupakula, Vijay Varadharajan -- Firewalls as Continuing Solutions for Network Security / Andy Luse, Anthony Townsend, Kevin Scheibe -- An Immune-Inspired Approach to Anomaly Detection / Jamie Twycross, Uwe Aickelin -- Cryptography for Information Security / Wasim A. Al-Hamdani -- Memory Corruption Attacks, Defenses, and Evasions / Carlo Bellettini, Julian L. Rrushi -- Design and Implementation of a Distributed Firewall / Dalila Boughaci ... [et al.] -- A Formal Verification Centred Development Process for Security Protocols / Tom Coffey, Reiner Dojen -- Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks / Ahsan Habib -- A "One-Pass" Methodology for Sensitive Data Disk Wipes / Doug White, Alan Rea --
Securing E-Mail Communication with XML Technology / Lijun Liao, Mark Manulis, Jörg Schwenk -- Aspect-Oriented Analysis of Security in Distributed Virtual Environment / Li Yang, Raimund K. Ege, Lin Luo -- Information Availability / Deepak Khazanchi, Andrew P. Martin -- Formal Analysis and Design of Authentication Protocols / Siraj Ahmed Shaikh -- Access Control Frameworks for a Distributed System / Rajeev R. Raje ... [et al.] -- Implications of FFIEC Guidance on Authentication in Electronic Banking / Manish Gupta, JinKyu Lee, H. R. Rao -- Disruptive Technology Impacts on Security / Sue Conger, Bret J. L. Landry -- Internal Auditing for Information Assurance / Sushma Mishra, Amita Goyal Chin -- IT Continuity in the Face of Mishaps / William H. Friedman -- Business Continuity and Disaster Recovery Plans / Yvette Ghormley -- Security Policies and Procedures / Yvette Ghormley -- Enterprise Access Control Policy Engineering Framework / Arjmand Samuel ... [et al.] -- Information Security Policies: Precepts and Practices / Sushil K. Sharma, Jatinder N.D. Gupta -- A Guide to Non-Disclosure Agreements for Researchers / Paul D. Witman, Kapp L. Johnson -- Assurance for Temporal Compatibility Using Contracts / Omkar J. Tilak, Rajeev R. Raje, Andrew M. Olson -- Spatial Authentication Using Cell Phones / Arjan Durresi -- Plugging Security Holes in Online Environment / Sushil K. Sharma, Jatinder N.D. Gupta, Ajay K. Gupta --
Six Keys to Improving Wireless Security / Erik Graham, Paul John Steinbart -- Human Factors in Information Security and Privacy / Robert W. Proctor, E. Eugene Schultz, Kim-Phuong L. Vu -- Threat Modeling and Secure Software Engineering Process / Wm. Arthur Conklin -- Guarding Corporate Data from Social Engineering Attacks / Christopher M. Botelho, Joseph A. Cazier -- Data Security for Storage Area Networks / Tom Clark -- Security Awareness: Virtual Environments and E-Learning / Edgar Weippl -- Security-Efficient Identity Management Using Service Provisioning (Markup Language) / Manish Gupta, Raj Sharman -- A Strategy for Enterprise VoIP Security / Dwayne Stevens, David T. Green -- Critical Success Factors and Indicators to Improve Information Systems Security Management Actions / Jose M. Torres, Jose M. Sarriegi, Javier Santos -- Privacy, Societal, and Ethical Concerns in Security / Rebecca H. Rutherfoord -- An MDA Compliant Approach for Designing Secure Data Warehouses / Rodolfo Villarroel ... [et al.] -- Survivability Evaluation Modeling Techniques and Measures / Hai Wang, Peng Liu -- The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features / Art Taylor -- Bioterrorism and Biosecurity / M. Pradhan, Y. Xia.
Síntesis:
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. This handbook includes 47 chapters offering comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by over 90 scholars in information science, this reference provides tools to combat the growing risk associated with technology.
Acceso electrónico:
Full Text Available From IGI Global 2009 Packages
Idioma:
Inglés