
Handbook of Research on Information Security and Assurance
by Gupta, Jatinder N. D.; Sharma, Sushil K.-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Textbook
Rent Digital
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Enterprise Security | |
Ransomware: A New Cyber Hijacking Threat to Enterprise | p. 1 |
E-Commerce: The Benefits Security Risks, and Countermeasures | p. 7 |
Information Warfare: Survival of the Fittest | p. 18 |
Evolution of Enterprise Security Federation | p. 29 |
Holistic Approach to Information Security Assurance and Risk Management in an Enterprise | p. 42 |
An Integrative Framework for the Study of Information Security Management Research | p. 55 |
Information Systems Risk Management: An Audit and Control Approach | p. 68 |
Security Approaches, Frameworks, Tools, and Technologies | |
Distributed Denial of Service Attacks in Networks | p. 85 |
Firewalls as Continuing Solutions for Network Security | p. 98 |
An Immune-Inspired Approach to Anomaly Detection | p. 109 |
Cryptography for Information Security | p. 122 |
Memory Corruption Attacks, Defenses, and Evasions | p. 139 |
Design and Implementation of a Distributed Firewall | p. 152 |
A Formal Verification Centred Development Process for Security Protocols | p. 165 |
Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks | p. 179 |
A "One-Pass" Methodology for Sensitive Data Disk Wipes | p. 193 |
Securing E-Mail Communication with XML Technology | p. 202 |
Aspect-Oriented Analysis of Security in Distributed Virtual Environment | p. 218 |
Information Availability | p. 230 |
Formal Analysis and Design of Authentication Protocols | p. 240 |
Access Control Frameworks for a Distributed System | p. 254 |
Implications of FFIEC Guidance on Authentication in Electronic Banking | p. 266 |
Disruptive Technology Impacts on Security | p. 279 |
Security Policies and Procedures | |
Internal Auditing for information Assurance | p. 292 |
IT Continuity in the Face of Mishaps | p. 301 |
Business Continuity and Disaster Recovery Plans | p. 308 |
Security Policies and Procedures | p. 320 |
Enterprise Access Control Policy Engineering Framework | p. 331 |
Information Security Policies: Precepts and Practices | p. 341 |
A Guide to Non-Disclosure Agreements for Researchers | p. 347 |
Assurance for Temporal Compatibility Using Contracts | p. 360 |
Spatial Authentication Using Cell Phones | p. 372 |
Mitigating Security Risks | |
Plugging Security Holes in Online Environment | p. 382 |
Six Keys to Improving Wireless Security | p. 393 |
Human Factors in Information Security and Privacy | p. 402 |
Threat Modeling and Secure Software Engineering Process | p. 415 |
Guarding Corporate Data from Social Emgineering Attacks | p. 423 |
Data Security for Storage Area "Networks | p. 433 |
Security Awareness: Virtual Environments and E-Learning | p. 441 |
Security-Efficient Identity Management Using Service Provisioning (Markup Language) | p. 447 |
A Strategy for Enterprise VoIP Security | p. 458 |
Critical Success Factors and Indicators to Improve Information Systems Security Management Actions | p. 467 |
Privacy, Societal, and Ethical Concerns in Security | p. 483 |
An MDA Compliant Approach for Designing Secure Data Warehouses | p. 495 |
Survivability Evaluation Modeling Techniques and Measures | p. 504 |
The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features | p. 518 |
Bioterrorism and Biosecurity | p. 529 |
About the Contributors | p. 537 |
Index | p. 551 |
Table of Contents provided by Blackwell. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.