Advances in enterprise information technology security

"This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Khadraoui, Djamel., Herrmann, Francine.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 04468nam a2200565 a 4500
001 29139
003 IGIG
005 20100526134319.0
006 m e d
007 cr bn||||m|||a
008 100518s2007 paua sb 001 0 eng d
010 # # |z 2007007267 
020 # # |a 9781599040929 (PDF) 
020 # # |z 9781599040905 (hardcover) 
020 # # |z 1599040905 (hardcover) 
020 # # |z 9781616927523 (softcover) 
024 7 # |a 10.4018/978-1-59904-090-5  |2 doi 
035 # # |a (CaBNVSL)gtp00540292 
035 # # |a (OCoLC)707611493 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HF5548.37  |b .A38 2007e 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Advances in enterprise information technology security  |c Djamel Khadraoui and Francine Herrmann, editors.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2007. 
300 # # |a electronic texts (xviii, 368 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references (p. 334-354) and index. 
505 0 # |a Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Hervé Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / Göran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Michéle Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / Mário M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil Stølen. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 # # |a "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on May 18, 2010). 
650 # 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 # 0 |a Information technology  |x Security measures. 
650 # 0 |a Computer security. 
650 # 0 |a Data protection. 
653 # # |a Applications and operating system software 
653 # # |a Communication networks and multimedia 
653 # # |a Computer and client/server systems 
653 # # |a Database security and integrity 
653 # # |a Enterprise security identity management 
653 # # |a Enterprise security risk management 
653 # # |a Local Area Network Security 
653 # # |a Phishing 
653 # # |a Security of collaborative applications 
653 # # |a Security policies 
700 1 # |a Khadraoui, Djamel. 
700 1 # |a Herrmann, Francine. 
710 2 # |a IGI Global. 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5  |z View fulltext via EzAccess