Cover image for Enterprise information systems assurance and system security managerial and technical issues
Enterprise information systems assurance and system security managerial and technical issues
Title:
Enterprise information systems assurance and system security managerial and technical issues
Author:
Warkentin, Merrill.
ISBN:
9781591409137
Publication Information:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2006.
Physical Description:
electronic texts (xii, 406 p. : ill.) : digital files.
Contents:
1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy -- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston -- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun -- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya -- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon -- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao -- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor -- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen -- 9. E-commerce security / Steven Furnell -- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville -- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning -- 12. High assurance products in IT security / Rayford B. Vaughn -- 13. The demilitarized zone as an information protection network / Jack J. Murphy -- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed --

15. Wireless security / Erik Graham, Paul John Steinbart -- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj -- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale -- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering -- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini -- 20. Digital forensics / David A. Dampier, A. Chris Bogen -- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder -- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson -- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis.
Abstract:
"This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher.
Added Corporate Author:
Holds: Copies: