NovaCat - NSU Libraries Catalog user info Skip the menu to the main content
     

Cover for {{ rc.info.title }}

{{rc.info.title}}

{{ rc.info.subtitle }}

{{ rc.info.author }}

{{ rc.info.edition }}

{{ rc.info.publisher }} {{ rc.info.year }}

Summary

{{rc.info.summary}} {{rc.info.summaryMore}}

Location Call # Volume Status
 E-BOOK      
Title Threats, countermeasures, and advances in applied information security / Manish Gupta, John Walp, and Raj Sharman, editors.
OCLC 00060768
ISBN 9781466609792 (ebook)
9781466609785 (hardcover)
9781466609808 (print & perpetual access)
ISBN/ISSN 10.4018/978-1-4666-0978-5 doi
Publisher Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), [2012]
©2012
Description electronic texts (477 pages) : digital files
LC Subject heading/s Information technology -- Security measures.
Information technology -- Management.
Management information systems.
Business enterprises -- Computer networks -- Security measures.
Risk management.
Bibliography Includes bibliographical references.
Contents 1. A pragmatic approach to intrusion response metrics / Chris Strasburg, Johnny Wong -- 2. Feature extraction methods for intrusion detection systems / Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic -- 3. A distributed and secure architecture for signature and decryption delegation through remote smart cards / Giuseppe Cattaneo, Pompeo Faruolo, Ivan Visconti -- 4. Information security management: awareness of threats in e-commerce / Mohammad Mahfuzur Rahman, Karim Mohammed Rezaul -- 5. Analyzing information security goals / Ella Kolkowska, Karin Hedström, Fredrik Karlsson6. Graphical passwords / Luigi Catuogno, Clemente Galdi -- 7. Assessing the security of software configurations / Afonso Araújo Neto, Marco Vieira -- 8. A decision support system for privacy compliance / Siani Pearson, Tomas Sander -- 9. Information security management based on linguistic sharing techniques / Marek R. Ogiela, Urszula Ogiela -- 10. SQL injection attacks countermeasures / Kasra Amirtahmasebi, Seyed Reza Jalalinia -- 11. Security and authentication issues of an embedded system designed and implemented for interactive internet users / Siddhartha Baruah, Anjana Kakoty Mahanta, Kanak Ch Sarma -- 12. Distributed key management scheme based on CL-PKC in P2P networks / Zhongwen Li, Zhibin Xu, Chen Liang -- 13. A privacy service for comparison of privacy and trust policies within SOA / David S. Allison, Hany F. EL Yamany, Miriam A.M. Capretz -- 14. Creating and applying security goal indicator trees in an industrial environment / Alessandra Bagnato ... [et al.] -- 15. Security enhancement of peer-to-peer session initiation / Xianghan Zheng, Vladimir Oleshchuk -- 16. Towards a framework for collaborative enterprise security / Janardan Misra -- 17. Privacy-aware organisation-based access control model (PrivOrBAC) / Nabil Ajam, Nora Cuppens-Boulahia, Fréderic Cuppens -- 18. Can formal methods really help: analyzing the security of electronic voting systems / Komminist Weldemariam, Adolfo Villafiorita -- 19. Countering spam robots: scrambled CAPTCHA and Hindi CAPTCHA / Aditya Raj, Tushar Pahwa, Ashish Jain -- 20. Embedded system security risk in a green-house environment / Trailokya Oraon -- 21. Security in wireless sensor networks with mobile codes / Frantisek Zboril ... [et al.] -- 22. Grid of security: a decentralized enforcement of the network security / Olivier Flauzac ... [et al.] -- 23. Effective malware analysis using stealth breakpoints / Amit Vasudevan -- 24. A dynamic cyber security economic model: incorporating value functions for all involved parties / C. Warren Axelrod.
Restrictions Restricted to subscribers or individual electronic text purchasers.
Unlimited user license access.
Abstract "This book addresses the fact that managing information security program while effectively managing risks has never been so critical, discussing issues such as emerging threats and countermeasures for effective management of information security in organizations"--Provided by publisher.
Additional physical form available note Also available in print.
System details note Mode of access: World Wide Web.
Source of Description Description based on title screen (IGI Global, viewed April 22, 2012).
Permanent link back to this item
https://novacat.nova.edu:446/record=b2924000~S13

Use classic NovaCat |