Editorial Advisory Board.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
1: Enterprise Security.
2: Ransomware: A New Cyber Hijacking Threat to Enterprises.
3: E-Commerce: The Benefits, Security Risks, and Countermeasures.
4: Information Warfare: Survival of the Fittest.
5: Evolution of Enterprise Security Federation.
6: A Holistic Approach to Information Security Assurance and Risk Management in an Enterprise.
7: An Integrative Framework for the Study of Information Security Management Research.
8: Information Systems Risk Management: An Audit and Control Approach.
9: Security Approaches, Frameworks, Tools, and Technologies.
10: Distributed Denial of Service Attacks in Networks.
11: Firewalls as Continuing Solutions for Network Security.
12: An Immune-Inspired Approach to Anomaly Detection.
13: Cryptography for Information Security.
14: Memory Corruption Attacks, Defenses, and Evasions.
15: Design and Implementation of a Distributed Firewall.
16: A Formal Verification Centred Development Process for Security Protocols.
17: Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks.
18: A “One-Pass” Methodology for Sensitive Data Disk Wipes.
19: Securing E-Mail Communication with XML Technology.
20: Aspect-Oriented Analysis of Security in Distributed Virtual Environment.
21: Information Availability.
22: Formal Analysis and Design of Authentication Protocols.
23: Access Control Frameworks for a Distributed System.
24: Implications of FFIEC Guidance on Authentication in Electronic Banking.
25: Disruptive Technology Impacts on Security.
26: Security Policies and Procedures.
27: Internal Auditing for Information Assurance.
28: IT Continuity in the Face of Mishaps.
29: Business Continuity and Disaster Recovery Plans.
30: Security Policies and Procedures.
31: Enterprise Access Control Policy Engineering Framework.
32: Information Security Policies: Precepts and Practices.
33: A Guide to Non-Disclosure Agreements for Researchers.
34: Assurance for Temporal Compatibility Using Contracts.
35: Spatial Authentication Using Cell Phones.
36: Mitigating Security Risks.
37: Plugging Security Holes in Online Environment.
38: Six Keys to Improving Wireless Security.
39: Human Factors in Information Security and Privacy.
40: Threat Modeling and Secure Software Engineering Process.
41: Guarding Corporate Data from Social Engineering Attacks.
42: Data Security for Storage Area Networks.
43: Security Awareness: Virtual Environments and E-Learning.
44: Security-Efficient Identity Management Using Service Provisioning (Markup Language).
45: A Strategy for Enterprise VoIP Security.
46: Critical Success Factors and Indicators to Improve Information Systems Security Management Actions.
47: Privacy, Societal, and Ethical Concerns in Security.
48: An MDA Compliant Approach for Designing Secure Data Warehouses.
49: Survivability Evaluation Modeling Techniques and Measures.
50: The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features.
51: Bioterrorism and Biosecurity.
About the Contributors.