|
|
|
|
LEADER |
04812nam a2200613 a 4500 |
001 |
29297 |
003 |
IGIG |
005 |
20100616114530.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
081229s2009 paua fsb 001 0 eng d |
010 |
# |
# |
|z 2008052439
|
020 |
# |
# |
|a 9781605663272 (ebook)
|
020 |
# |
# |
|z 1605663263 (hardcover)
|
020 |
# |
# |
|z 9781605663265 (hardcover)
|
020 |
# |
# |
|z 9781616924973 (pbk.)
|
024 |
7 |
# |
|a 10.4018/978-1-60566-326-5
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00541068
|
035 |
# |
# |
|a (OCoLC)430970889
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a QA76.9.A25
|b C918 2009e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a Cyber-security and global information assurance
|b threat analysis and response solutions /
|c [edited by] Kenneth J. Knapp.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2009.
|
300 |
# |
# |
|a electronic texts (xxii, 434 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references (p. 383-419) and index.
|
505 |
0 |
# |
|a 1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez -- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh -- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila -- 4.An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke -- 5. Security implications for management from the onset of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin -- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner -- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby -- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano -- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen -- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester -- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron -- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya --
|
505 |
0 |
# |
|a 14.Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee -- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson -- 16. Server hardening model development / Doug White, Alan Rea -- 17. Trusted computing / Jeff Teo -- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. This book provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on June 5, 2010).
|
650 |
# |
0 |
|a Information technology
|x Security measures.
|
650 |
# |
0 |
|a Computer security
|x Management.
|
650 |
# |
0 |
|a Cyberspace
|x Security measures.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
653 |
# |
# |
|a Cyber security threat problem
|
653 |
# |
# |
|a Global information assurance
|
653 |
# |
# |
|a Human factors in security
|
653 |
# |
# |
|a Information security management standards
|
653 |
# |
# |
|a Information sharing
|
653 |
# |
# |
|a Insider threat prevention, detection, and mitigation
|
653 |
# |
# |
|a Managing identity fraud
|
653 |
# |
# |
|a Onset of information terrorism
|
653 |
# |
# |
|a Public policy drivers
|
653 |
# |
# |
|a Security implications for management
|
653 |
# |
# |
|a Threat identification of an enterprise network
|
700 |
1 |
# |
|a Knapp, Kenneth J.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2008052439
|z 9781605663265
|z 1605663263
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-326-5
|z View fulltext via EzAccess
|