Enterprise information systems assurance and system security managerial and technical issues /

"This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Warkentin, Merrill., Vaughn, Rayford, 1947-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2006.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 04416nam a2200481 a 4500
001 29273
003 IGIG
005 20100606234102.0
006 m e d
007 cr bn||||m|||a
008 100523s2006 paua fsb 001 0 eng d
010 # # |z 2005032072 
020 # # |a 9781591409137 (PDF) 
020 # # |a 1591409136 (PDF) 
020 # # |z 9781591409113 (hardcover) 
020 # # |z 159140911X (hardcover) 
020 # # |z 9781591409120 (softcover) 
020 # # |z 1591409128 (softcover) 
024 7 # |a 10.4018/978-1-59140-911-3  |2 doi 
035 # # |a (CaBNVSL)gtp00540489 
035 # # |a (OCoLC)707613134 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a QA76.9.A25  |b E5455 2006e 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Enterprise information systems assurance and system security  |b managerial and technical issues /  |c [edited by] Merrill Warkentin and Rayford Vaughn.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2006. 
300 # # |a electronic texts (xii, 406 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references and index. 
505 0 # |a 1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy -- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston -- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun -- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya -- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon -- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao -- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor -- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen -- 9. E-commerce security / Steven Furnell -- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville -- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning -- 12. High assurance products in IT security / Rayford B. Vaughn -- 13. The demilitarized zone as an information protection network / Jack J. Murphy -- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed -- 
505 0 # |a 15. Wireless security / Erik Graham, Paul John Steinbart -- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj -- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale -- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering -- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini -- 20. Digital forensics / David A. Dampier, A. Chris Bogen -- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder -- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson -- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on May 25, 2010). 
650 # 0 |a Computer security. 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Management information systems. 
700 1 # |a Warkentin, Merrill. 
700 1 # |a Vaughn, Rayford,  |d 1947- 
710 2 # |a IGI Global. 
776 0 # |c Original  |w (DLC) 2005032072  |z 9781591409113  |z 159140911X 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3  |z View fulltext via EzAccess