Advances in information security and privacy series
عنوان فروست
Premier reference source
يادداشت کلی
متن يادداشت
"Premier reference source."
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references and index.
یادداشتهای مربوط به مندرجات
متن يادداشت
1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez -- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh -- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila -- 4. An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke -- 5. Security implications for management from the onset of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin -- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner -- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby -- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano -- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen -- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester -- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron -- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya.
متن يادداشت
14. Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee -- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson -- 16. Server hardening model development / Doug White, Alan Rea -- 17. Trusted computing / Jeff Teo -- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez.
بدون عنوان
0
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.