Editorial Advisory Board.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
1: Risk and Threat Assessment.
2: Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities.
3: An Attack Graph Based Approach for Threat Identification of an Enterprise Network.
4: Insider Threat Prevention, Detection and Mitigation.
5: An Autocorrelation Methodology for the Assessment of Security Assurance.
6: Security Implications for Management from the Onset of Information Terrorism.
7: Organizational and Human Security.
8: The Adoption of Information Security Management Standards: A Literature Review.
9: Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension.
10: Balancing the Public Policy Drivers in the Tension between Privacy and Security.
11: Human Factors in Security: The Role of Information Security Professionals within Organizations.
12: Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations.
13: An Approach to Managing Identity Fraud.
14: Emergency Response Planning.
15: A Repeatable Collaboration Process for Incident Response Planning.
16: Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration.
17: Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events.
18: An Overview of the Community Cyber Security Maturity Model.
19: Security Technologies.
20: Server Hardening Model Development: A Methodology-Based Approach to Increased System Security.
21: Trusted Computing: Evolution and Direction.
22: Introduction, Classification and Implementation of Honeypots.
Compilation of References.
About the Contributors.