Handbook of Research on Information Security and Assurance, 1st Edition

  • Published By:
  • ISBN-10: 1599048566
  • ISBN-13: 9781599048567
  • Grade Level Range: College Freshman - College Senior
  • 619 Pages | eBook
  • Original Copyright 2008 | Published/Released May 2009
  • This publication's content originally published in print form: 2008

  • Price:  Sign in for price



Offers definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Provides tools to combat the growing risk associated with technology.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Editorial Advisory Board.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
1: Enterprise Security.
2: Ransomware: A New Cyber Hijacking Threat to Enterprises.
3: E-Commerce: The Benefits, Security Risks, and Countermeasures.
4: Information Warfare: Survival of the Fittest.
5: Evolution of Enterprise Security Federation.
6: A Holistic Approach to Information Security Assurance and Risk Management in an Enterprise.
7: An Integrative Framework for the Study of Information Security Management Research.
8: Information Systems Risk Management: An Audit and Control Approach.
9: Security Approaches, Frameworks, Tools, and Technologies.
10: Distributed Denial of Service Attacks in Networks.
11: Firewalls as Continuing Solutions for Network Security.
12: An Immune-Inspired Approach to Anomaly Detection.
13: Cryptography for Information Security.
14: Memory Corruption Attacks, Defenses, and Evasions.
15: Design and Implementation of a Distributed Firewall.
16: A Formal Verification Centred Development Process for Security Protocols.
17: Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks.
18: A “One-Pass” Methodology for Sensitive Data Disk Wipes.
19: Securing E-Mail Communication with XML Technology.
20: Aspect-Oriented Analysis of Security in Distributed Virtual Environment.
21: Information Availability.
22: Formal Analysis and Design of Authentication Protocols.
23: Access Control Frameworks for a Distributed System.
24: Implications of FFIEC Guidance on Authentication in Electronic Banking.
25: Disruptive Technology Impacts on Security.
26: Security Policies and Procedures.
27: Internal Auditing for Information Assurance.
28: IT Continuity in the Face of Mishaps.
29: Business Continuity and Disaster Recovery Plans.
30: Security Policies and Procedures.
31: Enterprise Access Control Policy Engineering Framework.
32: Information Security Policies: Precepts and Practices.
33: A Guide to Non-Disclosure Agreements for Researchers.
34: Assurance for Temporal Compatibility Using Contracts.
35: Spatial Authentication Using Cell Phones.
36: Mitigating Security Risks.
37: Plugging Security Holes in Online Environment.
38: Six Keys to Improving Wireless Security.
39: Human Factors in Information Security and Privacy.
40: Threat Modeling and Secure Software Engineering Process.
41: Guarding Corporate Data from Social Engineering Attacks.
42: Data Security for Storage Area Networks.
43: Security Awareness: Virtual Environments and E-Learning.
44: Security-Efficient Identity Management Using Service Provisioning (Markup Language).
45: A Strategy for Enterprise VoIP Security.
46: Critical Success Factors and Indicators to Improve Information Systems Security Management Actions.
47: Privacy, Societal, and Ethical Concerns in Security.
48: An MDA Compliant Approach for Designing Secure Data Warehouses.
49: Survivability Evaluation Modeling Techniques and Measures.
50: The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features.
51: Bioterrorism and Biosecurity.
About the Contributors.