Enterprise information systems assurance and system security managerial and technical issues /
"This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher.
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2006.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- 1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy
- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston
- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun
- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya
- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon
- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao
- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen
- 9. E-commerce security / Steven Furnell
- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville
- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning
- 12. High assurance products in IT security / Rayford B. Vaughn
- 13. The demilitarized zone as an information protection network / Jack J. Murphy
- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed
- 15. Wireless security / Erik Graham, Paul John Steinbart
- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj
- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale
- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering
- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
- 20. Digital forensics / David A. Dampier, A. Chris Bogen
- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder
- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson
- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis.