Description |
1 online resource (electronic texts (xviii, 368 pages : illustrations)) |
Series |
IGI Global research collection
|
Contents |
Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Hervé Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / Göran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Michéle Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / Mário M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil Stølen |
Summary |
"This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field. It is an all-in-one reference for IT managers, network administrators, researchers, and students"--Provided by publisher |
Analysis |
Applications and operating system software |
|
Communication networks and multimedia |
|
Computer and client/server systems |
|
Database security and integrity |
|
Enterprise security identity management |
|
Enterprise security risk management |
|
Local Area Network Security |
|
Phishing |
|
Security of collaborative applications |
|
Security policies |
Notes |
Title from PDF title page (viewed May 18, 2010) |
Bibliography |
Includes bibliographical references (pages 334-354) and index |
Notes |
Print version record |
Subject |
Business enterprises -- Computer networks -- Security measures.
|
|
Information technology -- Security measures
|
|
Computer security
|
|
Data protection.
|
|
Business enterprises -- Computer networks -- Security measures.
|
|
Computer security.
|
|
Data protection.
|
|
Information technology -- Security measures.
|
Form |
Electronic book
|
Author |
Khadraoui, Djamel
|
|
Herrmann, Francine
|
|
IGI Global.
|
ISBN |
9781599040929 |
|
1599040921 |
|