NovaCat - NSU Libraries Catalog user info Skip the menu to the main content

LEADER 00000nam  2200577 a 4500 
001    00058283 
003    IGIG 
005    20120130005730.0 
006    m    e   d         
007    cr bn||||m|||a 
008    120123t20122012pau    fsb    000 0 eng d 
010    |z2011042029 
020    9781466601987 (ebook) 
020    |z9781466601970 (hardcover) 
020    |z9781466601994 (print & perpetual access) 
024 7  10.4018/978-1-4666-0197-0|2doi 
035    (OCoLC)807848558 
035    (CaBNVSL)gtp00550675 
040    CaBNVSL|cCaBNVSL|dCaBNVSL 
049    FNNN 
050  4 TK5105.59|b.S766 2012e 
245 00 Strategic and practical approaches for information 
       security governance :|btechnologies and applied solutions 
       /|cManish Gupta, John Walp, Raj Sharman, editors. 
264  1 Hershey, Pa. :|bIGI Global (701 E. Chocolate Avenue, 
       Hershey, Pennsylvania, 17033, USA),|c[2012] 
264  4 |c©2012 
300    electronic texts (420 pages) :|bdigital files 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references. 
505 0  1. Investigating the concept of information security 
       culture / Daniel Oost and Eng K. Chew -- 2. Assessing 
       market compliance of IT security solutions: a structured 
       approach using diffusion of innovations theory / Heiko 
       Rossnagel and Jan Zibuschka -- 3. Identity assurance in 
       open networks / Ivonne Thomas and Christoph Meinel -- 4. 
       Information security governance / Janne J. Korhonen, Kari 
       Hiekkanen and Juha Mykkänen -- 5. Enterprise information 
       security policies, standards, and procedures: a survey of 
       available standards and guidelines / Syed Irfan Nabi, 
       Ghmlas Saleh Al-Ghmlas and Khaled Alghathbar -- 6. ISMS 
       building for SMEs through the reuse of knowledge / Lus 
       Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernandez-
       Medina and Mario Piattini -- 7. Information security and 
       management in social network / Alkesh Patel and Ajit 
       Balakrishnan -- 8. Music is the key: using our enduring 
       memory for songs to help users log on / Marcia Gibson ... 
       [et al.] -- 9. Information system integrated security / 
       Milena Tvrdková -- 10. Surveillance communities of 
       practice: supporting aspects of information assurance for 
       safeguards and compliance monitoring / Peter Goldschmidt -
       - 11. Not every cloud brings rain: legal risks on the 
       horizon / Sylvia Kierkegaard -- 12. Securing the extended 
       enterprise: a method for analyzing external insider threat
       / Virginia N. L. Franqueira ... [et al.] -- 
505 8  13. Information security management systems cybernetics / 
       Wolfgang Boehmer -- 14. Fraud and identity theft issues / 
       Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan -- 
       15. Information security governance and standard based 
       management systems / Margareth Stoll and Ruth Breu -- 16. 
       A construct grid approach to security classification and 
       analysis / Michael Van Hilst and Eduardo B. Fernandez -- 
       17. Towards an organizational culture framework for 
       information security practices / Joo Soon Lim ... [et al.]
       -- 18. Establishment of enterprise secured information 
       architecture / Shyh-Chang Liu and Tsang- Hung Wu -- 19. 
       Information security management based on adaptive security
       policy using user behavior analysis / Ines Brosso and 
       Alessandro La Neve -- 20. Detecting credit fraud in e-
       business system: an information security perspective on 
       the banking sector in UK / Md Delwar Hussain Mahdi and 
       Karim Mohammed Rezaul -- 21. Safeguarding Australia from 
       cyber-terrorism: a SCADA risk framework / Christopher 
       Beggs and Matthew Warren -- 22. Detecting compliance 
       failures in unmanaged processes / Yurdaer N. Doganata -- 
       23. Loss of data: reflective case studies / Ian Rosewall 
       and Matt Warren. 
506    Restricted to subscribers or individual electronic text 
       purchasers. 
506    Unlimited user license access. 
520 3  "This book provides organizations with insights into 
       practical and applied solutions, frameworks, technologies 
       and practices on technological and organizational factors 
       in information security"--Provided by publisher. 
530    Also available in print. 
538    Mode of access: World Wide Web. 
588    Description based on title screen (IGI Global, viewed 
       January 23, 2012). 
650  0 Computer networks|xSecurity measures. 
650  0 Information networks|xSecurity measures. 
650  0 Data protection|xSecurity measures. 
700 1  Gupta, Manish,|d1978- 
700 1  Walp, John,|d1967- 
700 1  Sharman, Raj. 
710 2  IGI Global. 
776 0  |c(Original)|w(DLC)2011042029 
776 08 |iPrint version:|z1466601973|z9781466601970|w(DLC)  
       2011042029 
856 40 |uhttp://sherman.library.nova.edu/auth/index.php?aid=746&
       url=http://services.igi-global.com/resolvedoi/
       resolve.aspx?doi=10.4018/978-1-4666-0197-0|zAvailable via 
       IGI Global; click here for access<br /><img 
       class="wb_perm_icon" src="/screens/wb_cond_10.gif" 
       alt="Local access for all registered users. Remote access 
       only for NSU and Broward users."> 
935    9781466601987 (ebook) 
948    MARCIVE Processed 
948    jlee1 
948    jlee1 04/22 oclc worldcat holding update 
Location Call # Volume Status
 E-BOOK      

Use classic NovaCat |