Advances in Enterprise Information Technology Security, 1st Edition

  • Published By:
  • ISBN-10: 1599040921
  • ISBN-13: 9781599040929
  • Grade Level Range: College Freshman - College Senior
  • 368 Pages | eBook
  • Original Copyright 2007 | Published/Released October 2007
  • This publication's content originally published in print form: 2007

  • Price:  Sign in for price

About

Overview

Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world’s leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Table of Contents.
Detailed Table of Contents.
Foreword.
Preface.
Acknowledgment.
1: Security Architectures.
2: Security Architectures.
3: Security in GRID Computing.
4: Security of Symbian Based Mobile Devices.
5: Wireless Local Area Network Security.
6: Interoperability Among Instrusion Detection Systems.
7: Trust, Privacy, and Authorization.
8: Security in E-Health Applications.
9: Interactive Access Control and Trust Negotiation for Autonomic Communication.
10: Delegation Services: A Step Beyond Authorization.
11: From DRM to Enterprise Rights and Policy Management: Challenges and Opportunities.
12: Threat.
13: Limitations of Current Anti-Virus Scanning Technologies.
14: Phishing: The New Security Threat on the Internet.
15: Phishing Attacks and Countermeasures: Implications for Enterprise Information Security.
16: Prevention and Handling of Malicious Code.
17: Risk Management.
18: Security Risk Management Methodologies.
19: Information System Life Cycles and Security.
20: Software Specification and Attack Languages.
21: Dynamic Management of Security Constraints in Advanced Enterprises.
22: Assessing Enterprise Risk Level: The CORAS Approach.
Compilation of References.
About the Contributors.
Index.