Description |
xxiv, 467 pages : illustrations ; 29 cm |
Contents |
Contents note continued: ch. 10 Surveillance Communities of Practice: Supporting Aspects of Information Assurance for Safeguards and Compliance Monitoring / Peter Goldschmidt -- ch. 11 Not Every Cloud Brings Rain: Legal Risks on the Horizon / Sylvia Kierkegaard -- ch. 12 Securing the Extended Enterprise: A Method for Analyzing External Insider Threat / Roel Wieringa -- ch. 13 Information Security Management Systems Cybernetics / Wolfgang Boehmer -- ch. 14 Fraud and Identity Theft Issues / Chenniappan Chellappan -- ch. 15 Information Security Governance and Standard Based Management Systems / Ruth Breu -- ch. 16 A Construct Grid Approach to Security Classification and Analysis / Eduardo B. Fernandez -- ch. 17 Towards an Organizational Culture Framework for Information Security Practices / Sean Maynard -- ch. 18 Establishment of Enterprise Secured Information Architecture / Tsang-Hung Wu -- |
|
Contents note continued: ch. 19 Information Security Management Based on Adaptive Security Policy Using User Behavior Analysis / Alessandro La Neve -- ch. 20 Detecting Credit Fraud in E-Business System: An Information Security Perspective on the Banking Sector in UK / Karim Mohammed Rezaul -- ch. 21 Safeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework / Matthew Warren -- ch. 22 Detecting Compliance Failures in Unmanaged Processes / Yurdaer N. Doganata -- ch. 23 Loss of Data: Reflective Case Studies / Matt Warren |
|
Machine generated contents note: ch. 1 Investigating the Concept of Information Security Culture / Eng Chew -- ch. 2 Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory / Jan Zibuschka -- ch. 3 Identity Assurance in Open Networks / Ivonne Thomas -- ch. 4 Information Security Governance / Juha Mykkanen -- ch. 5 Enterprise Information Security Policies, Standards, and Procedures: A Survey of Available Standards and Guidelines / Khaled Alghathbar -- ch. 6 ISMS Building for SMEs through the Reuse of Knowledge / Mario Piattini -- ch. 7 Information Security and Management in Social Network / Ajit Balakrishnan -- ch. 8 Music is the Key: Using our Enduring Memory for Songs to Help Users Log On / Carsten Maple -- ch. 9 Information System Integrated Security / Milena Tvrdikova -- |
Summary |
"This book provides organizations with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors in information security"--Provided by publisher |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer networks -- Security measures.
|
|
Data protection -- Security measures.
|
|
Information networks -- Security measures.
|
Author |
Gupta, Manish, 1978-
|
|
Sharman, Raj.
|
|
Walp, John, 1967-
|
LC no. |
2011042029 |
ISBN |
9781466601970 (hardcover) |
|
9781466601987 (ebook) |
|
9781466601994 (print & perpetual access) |
|