|
|
|
|
LEADER |
04468nam a2200565 a 4500 |
001 |
29139 |
003 |
IGIG |
005 |
20100526134319.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
100518s2007 paua sb 001 0 eng d |
010 |
# |
# |
|z 2007007267
|
020 |
# |
# |
|a 9781599040929 (PDF)
|
020 |
# |
# |
|z 9781599040905 (hardcover)
|
020 |
# |
# |
|z 1599040905 (hardcover)
|
020 |
# |
# |
|z 9781616927523 (softcover)
|
024 |
7 |
# |
|a 10.4018/978-1-59904-090-5
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00540292
|
035 |
# |
# |
|a (OCoLC)707611493
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HF5548.37
|b .A38 2007e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a Advances in enterprise information technology security
|c Djamel Khadraoui and Francine Herrmann, editors.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2007.
|
300 |
# |
# |
|a electronic texts (xviii, 368 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references (p. 334-354) and index.
|
505 |
0 |
# |
|a Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Hervé Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / Göran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Michéle Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / Mário M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil Stølen.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
# |
# |
|a "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on May 18, 2010).
|
650 |
# |
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Information technology
|x Security measures.
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Data protection.
|
653 |
# |
# |
|a Applications and operating system software
|
653 |
# |
# |
|a Communication networks and multimedia
|
653 |
# |
# |
|a Computer and client/server systems
|
653 |
# |
# |
|a Database security and integrity
|
653 |
# |
# |
|a Enterprise security identity management
|
653 |
# |
# |
|a Enterprise security risk management
|
653 |
# |
# |
|a Local Area Network Security
|
653 |
# |
# |
|a Phishing
|
653 |
# |
# |
|a Security of collaborative applications
|
653 |
# |
# |
|a Security policies
|
700 |
1 |
# |
|a Khadraoui, Djamel.
|
700 |
1 |
# |
|a Herrmann, Francine.
|
710 |
2 |
# |
|a IGI Global.
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5
|z View fulltext via EzAccess
|