Handbook of research on information security and assurance / Jatinder N.D. Gupta, Sushil K. Sharma [editors].

"While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such,...

Full description

Saved in:
Bibliographic Details
Corporate Author: InfoSci-Books
Other Authors: Gupta, Jatinder N. D., Sharma, Sushil K.
Format: Ebook
Language:English
Published: Hershey, PA : Information Science Reference, c2009.
Subjects:
Online Access:IGI Global e-Book Collection
Table of Contents:
  • Section 1. Enterprise Security:
  • 1. Ransomware: A New Cyber Hijacking Threat to Enterprises / Xin Luo, Qinyu Liao
  • 2. E-Commerce: The Benefits, Security Risks, and Countermeasures / Joon S. Park
  • 3. Information Warfare: Survival of the Fittest / Pamela Ajoku
  • 4. Evolution of Enterprise Security Federation / Gaeil An, Joon S. Park
  • 5. A Holistic Approach to Information Security Assurance and Risk Management in an Enterprise / Roy Ng
  • 6. An Integrative Framework for the Study of Information Security Management Research / John D’Arcy, Anat Hovav
  • 7. Information Systems Risk Management: An Audit and Control Approach / Aditya Ponnam
  • Section 2. Security Approaches, Frameworks, Tools, and Technologies:
  • 8. Distributed Denial of Service Attacks in Networks / Udaya Kiran Tupakula
  • 9. Firewalls as Continuing Solutions for Network Security / Andy Luse
  • 10. An Immune-Inspired Approach to Anomaly Detection / Jamie Twycross
  • 11. Cryptography for Information Security / Wasim A. Al-Hamdani
  • 12. Memory Corruption Attacks, Defenses, and Evasions / Carlo Belletini
  • 13. Design and Implementation of a Distributed Firewall / Dalila Boughaci, Brahim Oubeka, Abdelkader Aissioui, Habiba Drias, Belaïd Benhamou
  • 14. A Formal Verification Centred Development Process for Security Protocols / Tom Coffey
  • 15. Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks / Ahsan Habib
  • 16. A "One-Pass" Methodology for Sensitive Data Disk Wipes / Doug White, Alan Rea
  • 17. Securing E-Mail Communication with XML Technology / Lijun Liao
  • 18. Aspect-Oriented Analysis of Security in Distributed Virtual Environment / Li Yang, Raimund K. Ege, Lin Luo
  • 19. Information Availability / Deepak Khazanchi
  • 20. Formal Analysis and Design of Authentication Protocols / Siraj Ahmed Shaikh
  • 21. Access Control Frameworks for a Distributed System / Rajeev R. Raje, Alex Crespi, Omkar J. Tilak, Andrew M. Olson
  • 22. Implications of FFIEC Guidance on Authentication in Electronic Banking / Manish Gupta, JinKyu Lee, H. R. Rao
  • 23. Disruptive Technology Impacts on Security / Sue Conger
  • Section 3. Security Policies and Procedures:
  • 24. Internal Auditing for Information Assurance / Sushma Mishra
  • 25. IT Continuity in the Face of Mishaps / William H. Friedman
  • 26. Business Continuity and Disaster Recovery Plans / Yvette Ghormley
  • 27. Security Policies and Procedures / Yvette Ghormley
  • 28. Enterprise Access Control Policy Engineering Framework / Arjmand Samuel
  • 29. Information Security Policies: Precepts and Practices / Sushil K. Sharma, Jatinder N.D. Gupta
  • 30. A Guide to Non-Disclosure Agreements for Researchers / Paul D. Witman
  • 31. Assurance for Temporal Compatibility Using Contracts / Omkar J. Tilak
  • 32. Spatial Authentication Using Cell Phones / Arjan Durresi
  • Section 4. Mitigating Security Risks:
  • 33. Plugging Security Holes in Online Environment / Sushil K. Sharma, Jatinder N.D. Gupta, Ajay K. Gupta
  • 34. Six Keys to Improving Wireless Security / Erik Graham, Paul John Steinbart
  • 35. Human Factors in Information Security and Privacy / Robert W. Proctor, E. Eugene Schultz, Kim-Phuong L. Vu
  • 36. Threat Modeling and Secure Software Engineering Process / Wm. Arthur Conklin
  • 37. Guarding Corporate Data from Social Engineering Attacks / Christopher M. Botelho, Joseph A. Cazier
  • 38. Data Security for Storage Area Networks / Tom Clark
  • 39. Security Awareness: Virtual Environments and E-Learning / Edgar Weippl
  • 40. Security-Efficient Identity Management Using Service Provisioning (Markup Language) / Manish Gupta
  • 41. A Strategy for Enterprise VoIP Security / Dwayne Stevens, David T. Green
  • 42. Critical Success Factors and Indicators to Improve Information Systems Security Management Actions / Jose M. Torres
  • 43. Privacy, Societal, and Ethical Concerns in Security / Rebecca H. Rutherfoord
  • 44. An MDA Compliant Approach for Designing Secure Data Warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
  • 45. Survivability Evaluation Modeling Techniques and Measures / Hai Wang
  • 46. The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features / Art Taylor
  • 47. Bioterrorism and Biosecurity / M. Pradhan.
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.