did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387298269

Security Management

by ; ; ;
  • ISBN13:

    9780387298269

  • ISBN10:

    0387298266

  • Format: Hardcover
  • Copyright: 2005-12-16
  • Publisher: Springer-Verlag New York Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $159.99 Save up to $40.00
  • Buy Used
    $119.99
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

The proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems address the increasing need for ensuring proper standards of integrity and control in information systems in an organizational context. The aim of this research is to guarantee that data, software, and the business processes are complete, adequate, and valid for the intended functionality and expectations of the owner (i.e. the user organization).

Table of Contents

Preface vii
Session 1 -- Security Standards
Information Security Standards: Adoption Drivers (Invited Paper)
1(20)
Jean-Noel Ezingeard
David Birchall
Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper)
21(20)
Gurvirender Tejay
Gurpreet Dhillon
Amita Goyal Chin
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)
41(18)
C. Farkas
V. Gowadia
A. Jain
D. Roy
Session 2 -- Security Culture (I)
How much should we pay for security? (Invited Paper)
59(12)
Sokratis K. Katsikas
Athanasios N. Yannacopoulos
Stefanos Gritzalis
Costas Lambrinoudakis
Peter Hatzopoulos
Do Not Ship, or Receive, Trojan Horses
71(12)
Corey Hirsch
Employee Security Perception in Cultivating Information Security Culture
83(12)
Omar Zakaria
Session 3 -- Access Management (I)
A Policy Framework for Access Management in Federated Information Sharing
95(26)
Rafae Bhatti
Elisa Bertino
Arif Ghafoor
A Hierarchical Release Control Policy Framework
121(20)
Chao Yao
William H. Winsborough
Sushil Jajodia
Session 4 -- Risk Management
Managing Uncertainty in Security Risk Model Forcasts with RAPSA/MC
141(16)
James R. Conrad
Paul Oman
Carol Taylor
The Mitigation of ICT Risk Using EMitl Tool: An Empirical Study
157(18)
Jabiri Kuwe Bakari
Christer Magnusson
Charles N. Tarimo
Louise Yngstrom
Risk Communication, Risk Perception and Information Security
175(10)
Malcolm Pattinson
Grantley Anderson
A Holistic Risk Analysis Method for Identifying Information Security Risks
185(20)
Janine L. Spears
Session 5 -- Security Culture (II)
A Responsibility Framework for Information Security
205(18)
Shaun Posthumus
Rossouw von Solms
Information Security Governance -- a Re-definition
223(14)
Rahul Rastogi
Rossouw von Solms
Can We Tune Information Security Management into Meeting Corporate Governance Needs? (Invited Paper)
237(12)
Louise Yngstrom
Session 6 -- Security Management
Measurement of Information Security in Processes and Products
249(18)
Reijo Savola
Juhani Anttila
Anni Sademies
Jorma Kajava
Jarkko Holappa
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises
267(18)
Vassilis Dimopoulos
Steven Furnell
A UML Approach in the ISMS Implementation
285(16)
Andrzej Bialas
Session 7 -- Applications
Attack Aware Integrity Control in Databases (Invited Abstract)
301(2)
Peng Liu
Characteristics and Measures for Mobile-Masquerader Detection
303(16)
Oleksiy Mazhelis
Seppo Puuronen
A Distributed Service Registry for Resource Sharing Among Ad-hoc Dynamic Coalitions (Invited Paper)
319(18)
Ravi Mukkamala
Vijayalakshmi Atluri
Janice Warner
Session 8 -- Access Management (II)
A Trust-based Model for Information Integrity in Open Systems
337(18)
Yanjun Zuo
Brajendra Panda
Scalable Access Policy Administration (Invited Paper)
355(16)
Arnon Rosenthal
Semantic Information Infrastructure Protection (Invited Abstract)
371(2)
Paul Thompson
Author Index 373

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program