Enterprise Security | |
Ransomware: A New Cyber Hijacking Threat to Enterprise | p. 1 |
E-Commerce: The Benefits Security Risks, and Countermeasures | p. 7 |
Information Warfare: Survival of the Fittest | p. 18 |
Evolution of Enterprise Security Federation | p. 29 |
Holistic Approach to Information Security Assurance and Risk Management in an Enterprise | p. 42 |
An Integrative Framework for the Study of Information Security Management Research | p. 55 |
Information Systems Risk Management: An Audit and Control Approach | p. 68 |
Security Approaches, Frameworks, Tools, and Technologies | |
Distributed Denial of Service Attacks in Networks | p. 85 |
Firewalls as Continuing Solutions for Network Security | p. 98 |
An Immune-Inspired Approach to Anomaly Detection | p. 109 |
Cryptography for Information Security | p. 122 |
Memory Corruption Attacks, Defenses, and Evasions | p. 139 |
Design and Implementation of a Distributed Firewall | p. 152 |
A Formal Verification Centred Development Process for Security Protocols | p. 165 |
Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks | p. 179 |
A "One-Pass" Methodology for Sensitive Data Disk Wipes | p. 193 |
Securing E-Mail Communication with XML Technology | p. 202 |
Aspect-Oriented Analysis of Security in Distributed Virtual Environment | p. 218 |
Information Availability | p. 230 |
Formal Analysis and Design of Authentication Protocols | p. 240 |
Access Control Frameworks for a Distributed System | p. 254 |
Implications of FFIEC Guidance on Authentication in Electronic Banking | p. 266 |
Disruptive Technology Impacts on Security | p. 279 |
Security Policies and Procedures | |
Internal Auditing for information Assurance | p. 292 |
IT Continuity in the Face of Mishaps | p. 301 |
Business Continuity and Disaster Recovery Plans | p. 308 |
Security Policies and Procedures | p. 320 |
Enterprise Access Control Policy Engineering Framework | p. 331 |
Information Security Policies: Precepts and Practices | p. 341 |
A Guide to Non-Disclosure Agreements for Researchers | p. 347 |
Assurance for Temporal Compatibility Using Contracts | p. 360 |
Spatial Authentication Using Cell Phones | p. 372 |
Mitigating Security Risks | |
Plugging Security Holes in Online Environment | p. 382 |
Six Keys to Improving Wireless Security | p. 393 |
Human Factors in Information Security and Privacy | p. 402 |
Threat Modeling and Secure Software Engineering Process | p. 415 |
Guarding Corporate Data from Social Emgineering Attacks | p. 423 |
Data Security for Storage Area "Networks | p. 433 |
Security Awareness: Virtual Environments and E-Learning | p. 441 |
Security-Efficient Identity Management Using Service Provisioning (Markup Language) | p. 447 |
A Strategy for Enterprise VoIP Security | p. 458 |
Critical Success Factors and Indicators to Improve Information Systems Security Management Actions | p. 467 |
Privacy, Societal, and Ethical Concerns in Security | p. 483 |
An MDA Compliant Approach for Designing Secure Data Warehouses | p. 495 |
Survivability Evaluation Modeling Techniques and Measures | p. 504 |
The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features | p. 518 |
Bioterrorism and Biosecurity | p. 529 |
About the Contributors | p. 537 |
Index | p. 551 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.