Enterprise information systems assurance and system security managerial and technical issues /

"This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Warkentin, Merrill., Vaughn, Rayford, 1947-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2006.
Subjects:
Online Access:View fulltext via EzAccess
Table of Contents:
  • 1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy
  • 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston
  • 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun
  • 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya
  • 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon
  • 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao
  • 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
  • 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen
  • 9. E-commerce security / Steven Furnell
  • 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville
  • 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning
  • 12. High assurance products in IT security / Rayford B. Vaughn
  • 13. The demilitarized zone as an information protection network / Jack J. Murphy
  • 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed
  • 15. Wireless security / Erik Graham, Paul John Steinbart
  • 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj
  • 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale
  • 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering
  • 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
  • 20. Digital forensics / David A. Dampier, A. Chris Bogen
  • 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder
  • 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson
  • 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis.