Advances in enterprise information technology security:
"This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2007]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students" - Provided by publisher |
Beschreibung: | Includes bibliographical references (p. 334-354) and index |
Beschreibung: | 1 Online-Ressource (xviii, 368 Seiten) Illustrationen |
ISBN: | 9781599040929 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044232693 | ||
003 | DE-604 | ||
005 | 20180309 | ||
007 | cr|uuu---uuuuu | ||
008 | 170320s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781599040929 |9 978-1-59904-092-9 | ||
024 | 7 | |a 10.4018/978-1-59904-090-5 |2 doi | |
035 | |a (OCoLC)978277740 | ||
035 | |a (DE-599)BVBBV044232693 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Advances in enterprise information technology security |c Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg), Francine Herrmann (University Paul Vertaine-Metz, France) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2007] | |
264 | 4 | |c © 2007 | |
300 | |a 1 Online-Ressource (xviii, 368 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references (p. 334-354) and index | ||
505 | 8 | |a Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Herv e Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / G oran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Mich ele Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / M ario M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil St len | |
520 | |a "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students" - Provided by publisher | ||
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Khadraoui, Djamel |0 (DE-588)1042175500 |4 edt | |
700 | 1 | |a Herrmann, Francine |0 (DE-588)1042175721 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59904-090-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59904-090-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61692-752-3 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029638286 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-090-5 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-090-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-090-5 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-090-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138439476903936 |
---|---|
adam_text | |
any_adam_object | |
author2 | Khadraoui, Djamel Herrmann, Francine |
author2_role | edt edt |
author2_variant | d k dk f h fh |
author_GND | (DE-588)1042175500 (DE-588)1042175721 |
author_facet | Khadraoui, Djamel Herrmann, Francine |
building | Verbundindex |
bvnumber | BV044232693 |
classification_rvk | ST 276 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Herv e Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / G oran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Mich ele Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / M ario M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil St len |
ctrlnum | (OCoLC)978277740 (DE-599)BVBBV044232693 |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044232693</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180309</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170320s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599040929</subfield><subfield code="9">978-1-59904-092-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59904-090-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)978277740</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044232693</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in enterprise information technology security</subfield><subfield code="c">Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg), Francine Herrmann (University Paul Vertaine-Metz, France)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2007]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 368 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 334-354) and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Herv e Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / G oran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Mich ele Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / M ario M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil St len</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khadraoui, Djamel</subfield><subfield code="0">(DE-588)1042175500</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Herrmann, Francine</subfield><subfield code="0">(DE-588)1042175721</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59904-090-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59904-090-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-752-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029638286</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-090-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-090-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-090-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-090-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044232693 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:30Z |
institution | BVB |
isbn | 9781599040929 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029638286 |
oclc_num | 978277740 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xviii, 368 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Advances in enterprise information technology security Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg), Francine Herrmann (University Paul Vertaine-Metz, France) Hershey ; New York Information Science Reference [2007] © 2007 1 Online-Ressource (xviii, 368 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references (p. 334-354) and index Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Herv e Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / G oran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Mich ele Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / M ario M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil St len "This book provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students" - Provided by publisher Unternehmen Business enterprises / Computer networks / Security measures Information technology / Security measures Computer security Data protection Datensicherung (DE-588)4011144-1 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Betriebliches Informationssystem (DE-588)4069386-7 s Datensicherung (DE-588)4011144-1 s DE-604 Khadraoui, Djamel (DE-588)1042175500 edt Herrmann, Francine (DE-588)1042175721 edt Erscheint auch als Druck-Ausgabe 978-1-59904-090-5 Erscheint auch als Druck-Ausgabe 1-59904-090-5 Erscheint auch als Druck-Ausgabe 978-1-61692-752-3 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Advances in enterprise information technology security Foreword -- Preface -- 1. Security architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius -- 2. Security in GRID computing / Eric Garcia, Herv e Guyennet, Fabien Hantz, and Jean-Christophe Lapayre -- 3. Security of Symbian based mobile devices / G oran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran -- 4. Wireless local area network security / Mich ele Germain, Alexis Ferrero, and Jouni Karvo -- 5. Interoperability among intrusion detection systems / M ario M. Freire -- 6. Security in e-health applications / Snezana Sucurovic -- 7. Interactive access control and trust negotiation for autonomic communication / Hristo Koshutanski and Fabio Massacci -- 8. Delegation services : a step beyond authorization / Isaac Agudo, Javier Lopez, and Jose A. Montenegro -- 9. From DRM to enterprise rights and policy management : challenges and opportunities / Jean-Henry Morin and Michel Pawlak -- 10. Limitations of current antivirus scanning technologies / Srinivas Mukkamala, Antonins Sulaiman, Patrick Chavez, and Andew H. Sung -- 11. Phishing : the new security threat on the Internet / Indranil Bose -- 12. Phishing attacks and countermeasures : implications for enterprise information security / Bogdan Hoanca and Kenrick Mock -- 13. Prevention and handling of malicious code / Halim Khelafa -- 14. Security risk management methodologies / Francine Herrmann and Djamel Khadraoui -- 15. Information system life cycles and security / Albin Zuccato -- 16. Software specification and attack langauges / Mohammed Hussein, Mohammed Raihan, and Mohammed Zulkernine -- 17. Dynamic management of security constraints in advanced enterprises / R. Manjunath -- 18. Assessing enterprise risk level : the CORAS approach / Fredrik Vraalsen, Tobias Mahler, Mass Soldal Lund, Ida Hogganvik, Folker den Braber, and Ketil St len Unternehmen Business enterprises / Computer networks / Security measures Information technology / Security measures Computer security Data protection Datensicherung (DE-588)4011144-1 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4069386-7 (DE-588)4143413-4 |
title | Advances in enterprise information technology security |
title_auth | Advances in enterprise information technology security |
title_exact_search | Advances in enterprise information technology security |
title_full | Advances in enterprise information technology security Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg), Francine Herrmann (University Paul Vertaine-Metz, France) |
title_fullStr | Advances in enterprise information technology security Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg), Francine Herrmann (University Paul Vertaine-Metz, France) |
title_full_unstemmed | Advances in enterprise information technology security Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg), Francine Herrmann (University Paul Vertaine-Metz, France) |
title_short | Advances in enterprise information technology security |
title_sort | advances in enterprise information technology security |
topic | Unternehmen Business enterprises / Computer networks / Security measures Information technology / Security measures Computer security Data protection Datensicherung (DE-588)4011144-1 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
topic_facet | Unternehmen Business enterprises / Computer networks / Security measures Information technology / Security measures Computer security Data protection Datensicherung Betriebliches Informationssystem Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-090-5 |
work_keys_str_mv | AT khadraouidjamel advancesinenterpriseinformationtechnologysecurity AT herrmannfrancine advancesinenterpriseinformationtechnologysecurity |