rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781599048550

Handbook of Research on Information Security and Assurance

by ;
  • ISBN13:

    9781599048550

  • ISBN10:

    1599048558

  • Format: Hardcover
  • Copyright: 2008-08-31
  • Publisher: Igi Global
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $265.00
  • Digital
    $318.00*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.

Table of Contents

Enterprise Security
Ransomware: A New Cyber Hijacking Threat to Enterprisep. 1
E-Commerce: The Benefits Security Risks, and Countermeasuresp. 7
Information Warfare: Survival of the Fittestp. 18
Evolution of Enterprise Security Federationp. 29
Holistic Approach to Information Security Assurance and Risk Management in an Enterprisep. 42
An Integrative Framework for the Study of Information Security Management Researchp. 55
Information Systems Risk Management: An Audit and Control Approachp. 68
Security Approaches, Frameworks, Tools, and Technologies
Distributed Denial of Service Attacks in Networksp. 85
Firewalls as Continuing Solutions for Network Securityp. 98
An Immune-Inspired Approach to Anomaly Detectionp. 109
Cryptography for Information Securityp. 122
Memory Corruption Attacks, Defenses, and Evasionsp. 139
Design and Implementation of a Distributed Firewallp. 152
A Formal Verification Centred Development Process for Security Protocolsp. 165
Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacksp. 179
A "One-Pass" Methodology for Sensitive Data Disk Wipesp. 193
Securing E-Mail Communication with XML Technologyp. 202
Aspect-Oriented Analysis of Security in Distributed Virtual Environmentp. 218
Information Availabilityp. 230
Formal Analysis and Design of Authentication Protocolsp. 240
Access Control Frameworks for a Distributed Systemp. 254
Implications of FFIEC Guidance on Authentication in Electronic Bankingp. 266
Disruptive Technology Impacts on Securityp. 279
Security Policies and Procedures
Internal Auditing for information Assurancep. 292
IT Continuity in the Face of Mishapsp. 301
Business Continuity and Disaster Recovery Plansp. 308
Security Policies and Proceduresp. 320
Enterprise Access Control Policy Engineering Frameworkp. 331
Information Security Policies: Precepts and Practicesp. 341
A Guide to Non-Disclosure Agreements for Researchersp. 347
Assurance for Temporal Compatibility Using Contractsp. 360
Spatial Authentication Using Cell Phonesp. 372
Mitigating Security Risks
Plugging Security Holes in Online Environmentp. 382
Six Keys to Improving Wireless Securityp. 393
Human Factors in Information Security and Privacyp. 402
Threat Modeling and Secure Software Engineering Processp. 415
Guarding Corporate Data from Social Emgineering Attacksp. 423
Data Security for Storage Area "Networksp. 433
Security Awareness: Virtual Environments and E-Learningp. 441
Security-Efficient Identity Management Using Service Provisioning (Markup Language)p. 447
A Strategy for Enterprise VoIP Securityp. 458
Critical Success Factors and Indicators to Improve Information Systems Security Management Actionsp. 467
Privacy, Societal, and Ethical Concerns in Securityp. 483
An MDA Compliant Approach for Designing Secure Data Warehousesp. 495
Survivability Evaluation Modeling Techniques and Measuresp. 504
The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Featuresp. 518
Bioterrorism and Biosecurityp. 529
About the Contributorsp. 537
Indexp. 551
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program