The Locator -- [(subject = "Computersicherheit")]

17 records matched your query       


Record 14 | Previous Record | MARC Display | Next Record | Search Results
Title:
Cyber-security and global information assurance : threat analysis and response solutions / Kenneth J. Knapp, editor.
Publisher:
Information Science Reference,
Copyright Date:
2009
Description:
xxii, 434 pages : illustrations ; 29 cm.
Subject:
Information technology--Security measures.
Computer security--Management.
Cyberspace--Security measures.
Data protection.
Computer networks--Security measures.
Computersicherheit.
Cyberspace.
Management.
Other Authors:
Knapp, Kenneth J. http://id.loc.gov/authorities/names/n78046990
Notes:
Includes bibliographical references (pages 383-419) and index.
Contents:
Sec. I. Risk and threat assessment -- Dynamic modeling of cyber security threat problem: the black market for vulnerabilities / Jaziar Radianti, Jose J. Gonzalez-- An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S.K. Ghosh -- Insider threat prevention, detection and mitigation / Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila -- An autocorrelation methodology for the assessment of security assurance / Richard T. Gordon, Allison S. Gehrke -- Security implications for management from the onset of information terrorism / Ken Webb -- Sec. II. Organizational and human security -- The adoption of information security management standards: a literature review / Yves Barlette, Vladislav V. Fomin -- Data smog, techno creep and the hobbling of the cognitive dimension / Pater R. Marksteiner -- Balancing the public policy drivers in the tension between privacy and security / John W. Bagby -- Human factors in security: the role of information security professionals within organizations / Indira R. Guzman [and others] -- Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack L. Koons III., Mark E. Nissen -- An approach to managing identity fraud / Rodger Jamieson [and others].
Sec. III. Emergency response planning -- A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah R. Pietron -- Pandemic influenza, worker absenteeism and impacts on critical infrastructures: freight transportation as an illustration / Dean A. Jones [and others] -- Information sharing: a study of information attributes and their relative significance during catastrophic events / Preeti Singh [and others] -- An overview of the community cyber security maturity model / Gregory B. White, Mark L. Huson -- Sec. IV. Security technologies -- Server hardening model development: a methodology-based approach to inreased system security / Doug White, Alan Rea -- Trusted computing: evolution and direction / Jeff Teo -- Introduction, classification and implementation of Honeypots / Miguel Jose Hernandez y Lopez, Carlos Francisco Lerma Resendez.
Summary:
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.
Series:
Advances in information security and privacy series
ISBN:
1605663271
9781605663272
1605663263
9781605663265
OCLC:
(OCoLC)286505380
LCCN:
2008052439
Locations:
OVUX522 -- University of Iowa Libraries (Iowa City)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.