Advances in enterprise information technology security:
"This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA [u.a.]
Information Science Reference
2007
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students"--Provided by publisher. |
Beschreibung: | Literaturangaben |
Beschreibung: | XVIII, 368 S. Ill., graph. Darst. |
ISBN: | 9781599040905 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022957904 | ||
003 | DE-604 | ||
005 | 20090707 | ||
007 | t | ||
008 | 071112s2007 xxuad|| |||| 00||| eng d | ||
010 | |a 2007007267 | ||
020 | |a 9781599040905 |9 978-1-59904-090-5 | ||
035 | |a (OCoLC)85822484 | ||
035 | |a (DE-599)BVBBV022957904 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 | ||
050 | 0 | |a HF5548.37 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Advances in enterprise information technology security |c Djamel Khadraoui ... |
264 | 1 | |a Hershey, PA [u.a.] |b Information Science Reference |c 2007 | |
300 | |a XVIII, 368 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Literaturangaben | ||
520 | 3 | |a "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students"--Provided by publisher. | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Khadraoui, Djamel |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-59904-092-9 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016162311&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016162311 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804137203060703232 |
---|---|
adam_text | Table
of
Contents
Foreword
.............................................................................................................................................xii
Preface
................................................................................................................................................xiv
Acknowledgment
.............................................................................................................................xviii
Section I
Security Architectures
Chapter I
Security Architectures
/
Sophie Gastellier-Prevost and
Maryline Laurent-Maknavicim.......................1
Chapter II
Security in GRID Computing
/
Eric Garcia,
Hervé Guyennet, Fabien Hantz,
and
Jean-Christophe
Lapayre
......................................................................................................................20
Chapter III
Security of Symbian Based Mobile Devices
/
Göran Pulkkis,
KayJ. Grahn,
Jonny Karlsson,
and Nhat Dai
Tran.....................................................................................................31
Chapter IV
Wireless Local Area Network Security
/
Michèle
Germain, Alexis
Ferrerò,
andJouni Karvo
............75
Chapter V
Interoperability Among Intrusion Detection Systems
/
Mario M.
Freire
.............................................92
Section II
Trust, Privacy, and Authorization
Chapter VI
Security in
Е
-Health Applications
/
Snezana Sucurovic
.....................................................................104
Chapter
Vii
Interactive Access Control and Trust Negotiation for
Autonomie
Communication
/
Hristo Koshutanski and
Fabio
Massacci
............................................................................................120
Chapter
VIII
Delegation Services: A Step Beyond Authorization
/
Isaac
Agudo,
Javier Lopez, and
Jose A. Montenegro
.............................................................................................................................149
Chapter IX
From DRM to Enterprise Rights and Policy Management: Challenges and Opportunities/
Jean-Henry Morin and
Mic hei
Pawlak...............................................................................................
169
Section
III
Threat
Chapter X
Limitations of Current
Anti-
Virus Scanning Technologies
/
Srinivas Mukkamala,
Antonim Sułaiman,
Patrick Chavez, andAndew H. Sung
..................................................................190
Chapter XI
Phishing: The New Security Threat on the Internet
/
Indranil
Bose
...................................................210
Chapter
XII
Phishing Attacks and Countermeasures:
Implications for Enterprise Information Security
/
Bogdan
Hoanca and
Kenrick
Mock
...................221
Chapter
XIII
Prevention and Handling of Malicious Code
/
Halim Khelafa
...........................................................239
Section IV
Risk Management
Chapter
XIV
Security Risk Management Methodologies
/
Francine Herrmann and Djamel Khadraoui
..............261
Chapter XV
Information System Life Cycles and Security/
Albin
Zuccata
...........................................................274
Chapter
XVI
Software Specification and Attack
Langauges /
Mohammed Hussein, Mohammed Raihan,
and Mohammed Zulkernine
................................................................................................................285
Chapter
XVII
Dynamic Management of Security Constraints in Advanced Enterprises/ R. Mcmjunath
..................302
Chapter
XVIII
Assessing Enterprise Risk Level: The CORAS Approach
/
Fredrik Vraalsen,
Tobias Mahler,
Mass
Soldai
Lund, Ida Hogganvik, Folkerden Braber, and Ketil
Stelen
...........................................311
Compilation of References
..............................................................................................................334
About the Contributors
...................................................................................................................355
Index
...................................................................................................................................................363
|
adam_txt |
Table
of
Contents
Foreword
.xii
Preface
.xiv
Acknowledgment
.xviii
Section I
Security Architectures
Chapter I
Security Architectures
/
Sophie Gastellier-Prevost and
Maryline Laurent-Maknavicim.1
Chapter II
Security in GRID Computing
/
Eric Garcia,
Hervé Guyennet, Fabien Hantz,
and
Jean-Christophe
Lapayre
.20
Chapter III
Security of Symbian Based Mobile Devices
/
Göran Pulkkis,
KayJ. Grahn,
Jonny Karlsson,
and Nhat Dai
Tran.31
Chapter IV
Wireless Local Area Network Security
/
Michèle
Germain, Alexis
Ferrerò,
andJouni Karvo
.75
Chapter V
Interoperability Among Intrusion Detection Systems
/
Mario M.
Freire
.92
Section II
Trust, Privacy, and Authorization
Chapter VI
Security in
Е
-Health Applications
/
Snezana Sucurovic
.104
Chapter
Vii
Interactive Access Control and Trust Negotiation for
Autonomie
Communication
/
Hristo Koshutanski and
Fabio
Massacci
.120
Chapter
VIII
Delegation Services: A Step Beyond Authorization
/
Isaac
Agudo,
Javier Lopez, and
Jose A. Montenegro
.149
Chapter IX
From DRM to Enterprise Rights and Policy Management: Challenges and Opportunities/
Jean-Henry Morin and
Mic hei
Pawlak.
169
Section
III
Threat
Chapter X
Limitations of Current
Anti-
Virus Scanning Technologies
/
Srinivas Mukkamala,
Antonim Sułaiman,
Patrick Chavez, andAndew H. Sung
.190
Chapter XI
Phishing: The New Security Threat on the Internet
/
Indranil
Bose
.210
Chapter
XII
Phishing Attacks and Countermeasures:
Implications for Enterprise Information Security
/
Bogdan
Hoanca and
Kenrick
Mock
.221
Chapter
XIII
Prevention and Handling of Malicious Code
/
Halim Khelafa
.239
Section IV
Risk Management
Chapter
XIV
Security Risk Management Methodologies
/
Francine Herrmann and Djamel Khadraoui
.261
Chapter XV
Information System Life Cycles and Security/
Albin
Zuccata
.274
Chapter
XVI
Software Specification and Attack
Langauges /
Mohammed Hussein, Mohammed Raihan,
and Mohammed Zulkernine
.285
Chapter
XVII
Dynamic Management of Security Constraints in Advanced Enterprises/ R. Mcmjunath
.302
Chapter
XVIII
Assessing Enterprise Risk Level: The CORAS Approach
/
Fredrik Vraalsen,
Tobias Mahler,
Mass
Soldai
Lund, Ida Hogganvik, Folkerden Braber, and Ketil
Stelen
.311
Compilation of References
.334
About the Contributors
.355
Index
.363 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV022957904 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 |
callnumber-search | HF5548.37 |
callnumber-sort | HF 45548.37 |
callnumber-subject | HF - Commerce |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)85822484 (DE-599)BVBBV022957904 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02387nam a2200517zc 4500</leader><controlfield tag="001">BV022957904</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090707 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">071112s2007 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007007267</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599040905</subfield><subfield code="9">978-1-59904-090-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85822484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022957904</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.37</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in enterprise information technology security</subfield><subfield code="c">Djamel Khadraoui ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA [u.a.]</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 368 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khadraoui, Djamel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-59904-092-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016162311&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016162311</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV022957904 |
illustrated | Illustrated |
index_date | 2024-07-02T19:03:32Z |
indexdate | 2024-07-09T21:08:33Z |
institution | BVB |
isbn | 9781599040905 |
language | English |
lccn | 2007007267 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016162311 |
oclc_num | 85822484 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XVIII, 368 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Advances in enterprise information technology security Djamel Khadraoui ... Hershey, PA [u.a.] Information Science Reference 2007 XVIII, 368 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Premier reference source Literaturangaben "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students"--Provided by publisher. Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Betriebliches Informationssystem (DE-588)4069386-7 s Datensicherung (DE-588)4011144-1 s DE-604 Khadraoui, Djamel Sonstige oth Erscheint auch als Online-Ausgabe 978-1-59904-092-9 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016162311&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Advances in enterprise information technology security Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem (DE-588)4069386-7 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4069386-7 (DE-588)4011144-1 (DE-588)4143413-4 |
title | Advances in enterprise information technology security |
title_auth | Advances in enterprise information technology security |
title_exact_search | Advances in enterprise information technology security |
title_exact_search_txtP | Advances in enterprise information technology security |
title_full | Advances in enterprise information technology security Djamel Khadraoui ... |
title_fullStr | Advances in enterprise information technology security Djamel Khadraoui ... |
title_full_unstemmed | Advances in enterprise information technology security Djamel Khadraoui ... |
title_short | Advances in enterprise information technology security |
title_sort | advances in enterprise information technology security |
topic | Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem (DE-588)4069386-7 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Unternehmen Business enterprises Computer networks Security measures Information technology Security measures Computer security Data protection Betriebliches Informationssystem Datensicherung Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016162311&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT khadraouidjamel advancesinenterpriseinformationtechnologysecurity |