Handbook of Research on Information Security and Assurance

by ;
Format: Hardcover
Pub. Date: 2008-08-31
Publisher(s): Igi Global
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $265.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$318.00
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$318.00*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.

Table of Contents

Enterprise Security
Ransomware: A New Cyber Hijacking Threat to Enterprisep. 1
E-Commerce: The Benefits Security Risks, and Countermeasuresp. 7
Information Warfare: Survival of the Fittestp. 18
Evolution of Enterprise Security Federationp. 29
Holistic Approach to Information Security Assurance and Risk Management in an Enterprisep. 42
An Integrative Framework for the Study of Information Security Management Researchp. 55
Information Systems Risk Management: An Audit and Control Approachp. 68
Security Approaches, Frameworks, Tools, and Technologies
Distributed Denial of Service Attacks in Networksp. 85
Firewalls as Continuing Solutions for Network Securityp. 98
An Immune-Inspired Approach to Anomaly Detectionp. 109
Cryptography for Information Securityp. 122
Memory Corruption Attacks, Defenses, and Evasionsp. 139
Design and Implementation of a Distributed Firewallp. 152
A Formal Verification Centred Development Process for Security Protocolsp. 165
Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacksp. 179
A "One-Pass" Methodology for Sensitive Data Disk Wipesp. 193
Securing E-Mail Communication with XML Technologyp. 202
Aspect-Oriented Analysis of Security in Distributed Virtual Environmentp. 218
Information Availabilityp. 230
Formal Analysis and Design of Authentication Protocolsp. 240
Access Control Frameworks for a Distributed Systemp. 254
Implications of FFIEC Guidance on Authentication in Electronic Bankingp. 266
Disruptive Technology Impacts on Securityp. 279
Security Policies and Procedures
Internal Auditing for information Assurancep. 292
IT Continuity in the Face of Mishapsp. 301
Business Continuity and Disaster Recovery Plansp. 308
Security Policies and Proceduresp. 320
Enterprise Access Control Policy Engineering Frameworkp. 331
Information Security Policies: Precepts and Practicesp. 341
A Guide to Non-Disclosure Agreements for Researchersp. 347
Assurance for Temporal Compatibility Using Contractsp. 360
Spatial Authentication Using Cell Phonesp. 372
Mitigating Security Risks
Plugging Security Holes in Online Environmentp. 382
Six Keys to Improving Wireless Securityp. 393
Human Factors in Information Security and Privacyp. 402
Threat Modeling and Secure Software Engineering Processp. 415
Guarding Corporate Data from Social Emgineering Attacksp. 423
Data Security for Storage Area "Networksp. 433
Security Awareness: Virtual Environments and E-Learningp. 441
Security-Efficient Identity Management Using Service Provisioning (Markup Language)p. 447
A Strategy for Enterprise VoIP Securityp. 458
Critical Success Factors and Indicators to Improve Information Systems Security Management Actionsp. 467
Privacy, Societal, and Ethical Concerns in Securityp. 483
An MDA Compliant Approach for Designing Secure Data Warehousesp. 495
Survivability Evaluation Modeling Techniques and Measuresp. 504
The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Featuresp. 518
Bioterrorism and Biosecurityp. 529
About the Contributorsp. 537
Indexp. 551
Table of Contents provided by Blackwell. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.