|
|
|
|
LEADER |
05298nam a2200625 a 4500 |
001 |
19525 |
003 |
IGIG |
005 |
20120130005730.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
120123s2012 pau fsb 000 0 eng d |
010 |
# |
# |
|z 2011042029
|
020 |
# |
# |
|a 9781466601987 (ebook)
|
020 |
# |
# |
|z 9781466601970 (hardcover)
|
020 |
# |
# |
|z 9781466601994 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-4666-0197-0
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00550675
|
035 |
# |
# |
|a (OCoLC)807848558
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK5105.59
|b .S766 2012e
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Strategic and practical approaches for information security governance
|b technologies and applied solutions /
|c Manish Gupta, John Walp, Raj Sharman, editors.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2012.
|
300 |
# |
# |
|a electronic texts (420 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. Investigating the concept of information security culture / Daniel Oost and Eng K. Chew -- 2. Assessing market compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan Zibuschka -- 3. Identity assurance in open networks / Ivonne Thomas and Christoph Meinel -- 4. Information security governance / Janne J. Korhonen, Kari Hiekkanen and Juha Mykkänen -- 5. Enterprise information security policies, standards, and procedures: a survey of available standards and guidelines / Syed Irfan Nabi, Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS building for SMEs through the reuse of knowledge / Lus̕ Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernandez-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8. Music is the key: using our enduring memory for songs to help users log on / Marcia Gibson ... [et al.] -- 9. Information system integrated security / Milena Tvrdk̕ová -- 10. Surveillance communities of practice: supporting aspects of information assurance for safeguards and compliance monitoring / Peter Goldschmidt -- 11. Not every cloud brings rain: legal risks on the horizon / Sylvia Kierkegaard -- 12. Securing the extended enterprise: a method for analyzing external insider threat / Virginia N. L. Franqueira ... [et al.] --
|
505 |
8 |
# |
|a 13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues / Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 15. Information security governance and standard based management systems / Margareth Stoll and Ruth Breu -- 16. A construct grid approach to security classification and analysis / Michael Van Hilst and Eduardo B. Fernandez -- 17. Towards an organizational culture framework for information security practices / Joo Soon Lim ... [et al.] -- 18. Establishment of enterprise secured information architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. Information security management based on adaptive security policy using user behavior analysis / Ines Brosso and Alessandro La Neve -- 20. Detecting credit fraud in e-business system: an information security perspective on the banking sector in UK / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk framework / Christopher Beggs and Matthew Warren -- 22. Detecting compliance failures in unmanaged processes / Yurdaer N. Doganata -- 23. Loss of data: reflective case studies / Ian Rosewall and Matt Warren.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed January 23, 2012).
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Information networks
|x Security measures.
|
650 |
# |
0 |
|a Data protection
|x Security measures.
|
653 |
# |
# |
|a Access control methods and models
|
653 |
# |
# |
|a Data loss prevention approaches
|
653 |
# |
# |
|a Enforcement policies
|
653 |
# |
# |
|a Forensics and investigation
|
653 |
# |
# |
|a Fraud and identity theft
|
653 |
# |
# |
|a Identification and authentication technologies
|
653 |
# |
# |
|a Information security governance frameworks
|
653 |
# |
# |
|a Information security management frameworks
|
653 |
# |
# |
|a Legal and regulatory oversight
|
653 |
# |
# |
|a Security auditing
|
653 |
# |
# |
|a Accountability
|
653 |
# |
# |
|a Storage and device security
|
700 |
1 |
# |
|a Gupta, Manish,
|d 1978-
|
700 |
1 |
# |
|a Walp, John,
|d 1967-
|
700 |
1 |
# |
|a Sharman, Raj.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2011042029
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2011042029
|z 9781466601970
|z 1466601973
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0197-0
|3 Chapter PDFs via platform:
|