Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, 1st Edition

  • Published By:
  • ISBN-10: 1591409136
  • ISBN-13: 9781591409137
  • Grade Level Range: College Freshman - College Senior
  • 406 Pages | eBook
  • Original Copyright 2006 | Published/Released October 2006
  • This publication's content originally published in print form: 2006

  • Price:  Sign in for price



Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges in the IT field -- how to create secure environments for the application of technology to serve future needs. This book bridges the gap between theory and practice, academia and industry, computer science and MIS. The chapters provide an integrated, holistic perspective on this complex set of challenges, supported with practical experiences of leading figures from all realms. Enterprise Information Systems Assurance and System Securityprovides an excellent collection for corporate executives who are charged with securing their systems and data, students studying the topic of business information security, and those who simply have an interest in this exciting topic.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues Table of Contents.
1: Security Policy and Management.
2: A Model of Information Security Governance for E-Business.
3: IT Security Governance and Centralized Security Controls.
4: A Case Study of Effectively Implemented Information Systems Security Policy.
5: Malware and Antivirus Deployment for Enterprise Security.
6: Security Implications for Business.
7: The Impact of Sarbanes-Oxley (SOX) Act on Information Security Governance.
8: A Security Blueprint for E-Business Applications.
9: Security Management for an E-Enterprise.
10: Implementing IT Security for Small and Medium Enterprises.
11: E-Commerce Security.
12: The Survivability Principle: IT-Enabled Dispersal of Organizational Capital.
13: Security Engineering.
14: Security Engineering: It Is All About Control and Assurance Objectives.
15: High Assurance Products in IT Security.
16: The Demilitarized Zone as an Information Protection Network.
17: Software Security Engineering: Toward Unifying Software Engineering and Security Engineering.
18: Wireless Security.
19: Security Technologies.
20: Intrusion Detection and Response.
21: Deploying Honeynets.
22: Steganography and Steganalysis.
23: Designing Secure Data Warehouses.
24: Digital Forensics.
25: Authentication Issues.
26: A Comparison of Authentication, Authorization and Auditing in Windows and Linux.
27: Taxonomies of User-Authentication Methods in Computer Networks.
28: Identity Management: A Comprehensive Approach to Ensuring a Secure Network Infrastructure.
About the Authors.