Document Type
|
:
|
BL
|
Record Number
|
:
|
1032428
|
Doc. No
|
:
|
b786798
|
Title & Author
|
:
|
Cyber-security and global information assurance : : threat analysis and response solutions /\ Kenneth J. Knapp [editor].
|
Publication Statement
|
:
|
Hershey, Pa. :: Information Science Reference,, ©2009.
|
Series Statement
|
:
|
Advances in information security and privacy series
|
|
:
|
Premier reference source
|
Page. NO
|
:
|
1 online resource (xxii, 434 pages) :: illustrations.
|
ISBN
|
:
|
1282057154
|
|
:
|
: 1605663271
|
|
:
|
: 6612057157
|
|
:
|
: 9781282057159
|
|
:
|
: 9781605663272
|
|
:
|
: 9786612057151
|
|
:
|
1605663263
|
|
:
|
9781605663265
|
Notes
|
:
|
"Premier reference source."
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez -- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh -- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila -- 4. An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke -- 5. Security implications for management from the onset of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin -- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner -- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby -- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano -- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen -- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester -- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron -- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya.
|
|
:
|
14. Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee -- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson -- 16. Server hardening model development / Doug White, Alan Rea -- 17. Trusted computing / Jeff Teo -- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez.
|
Abstract
|
:
|
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security-- Management.
|
Subject
|
:
|
Cyberspace-- Security measures.
|
Subject
|
:
|
Data protection.
|
Subject
|
:
|
Information technology-- Security measures.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security-- Management.
|
Subject
|
:
|
COMPUTERS-- Internet-- Security.
|
Subject
|
:
|
COMPUTERS-- Networking-- Security.
|
Subject
|
:
|
COMPUTERS-- Security-- General.
|
Subject
|
:
|
Data protection.
|
Subject
|
:
|
Information technology-- Security measures.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25C918 2009eb
|
Added Entry
|
:
|
Knapp, Kenneth J., (Kenneth Joseph),1966-
|