Information assurance and security technologies for risk assessment and threat management advances /

"This book details current trends and advances in information assurance and security, as well as explores emerging applications"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Chou, Te-Shun, 1964-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2011.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 03547nam a2200577 a 4500
001 19462
003 IGIG
005 20111128142852.0
006 m e d
007 cr bn||||m|||a
008 111119s2011 pau fsb 000 0 eng d
010 # # |z 2011038350 
020 # # |a 9781613505083 (ebook) 
020 # # |z 9781613505076 (hardcover) 
020 # # |z 9781613505090 (print & perpetual access) 
024 7 # |a 10.4018/978-1-61350-507-6  |2 doi 
035 # # |a (CaBNVSL)gtp00550250 
035 # # |a (OCoLC)764478708 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HD49  |b .I54 2011e 
082 0 4 |a 658.4/72  |2 23 
245 0 0 |a Information assurance and security technologies for risk assessment and threat management  |b advances /  |c Te-Shun Chou, editor.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c 2011. 
300 # # |a electronic texts (322 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a 1. Attacks on IT systems: categories of motives / Georg Disterer -- 2. Wireless security / Faisal Kaleem and Kang K. Yen -- 3. Analysis, development and deployment of statistical anomaly detection techniques for real e-mail traffic / Gianluca Papaleo ... [et al.] -- 4. Forensics challenges for mobile phone security / Halim M. Khelalfa -- 5. Applying continuous authentication to protect electronic transactions / Silas Leite and Paulo Roberto de Lira Gondim -- 6. Identity-based cryptography: applications, vulnerabilities and future directions / Jenny Torres, Michele Nogueira and Guy Pujolle -- 7. Audio visual system for large scale people authentication and recognition over Internet Protocol (IP) / Sue Inn Ch'ng ... [et al.] -- 8. Firewall / Biwu Yang -- 9. Risk assessment and real time vulnerability identification in it environments / Laerte Peotta de Melo and Paulo Roberto de Lira Gondim -- 10. Challenges to managing privacy impact assessment of personally identifiable data / Cyril Onwubiko -- 11. Combining security and privacy in requirements engineering / Saeed Abu-Nimeh and Nancy R. Mead -- 12. Regulatory and policy compliance with regard to identity theft prevention, detection, and response / Guillermo Francia and Frances Shannon Hutchinson. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book details current trends and advances in information assurance and security, as well as explores emerging applications"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed November 19, 2011). 
650 # 0 |a Crisis management. 
650 # 0 |a Computer security. 
650 # 0 |a Computer networks  |x Security measures. 
653 # # |a Access control 
653 # # |a Attacks 
653 # # |a Authentication 
653 # # |a Biometric system 
653 # # |a Cryptography 
653 # # |a Firewall 
653 # # |a Intrusion detection and prevention 
653 # # |a Threats 
653 # # |a Virtual private network 
653 # # |a Vulnerabilities 
653 # # |a Wireless security 
700 1 # |a Chou, Te-Shun,  |d 1964- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2011038350 
776 0 8 |i Print version:  |w (DLC) 2011038350  |z 9781613505076  |z 1613505078 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-507-6  |3 Chapter PDFs via platform: