Enterprise information systems assurance and system security: managerial and technical issues
"This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher.
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2006.
|
Schlagworte: | |
Online-Zugang: | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3 |
Zusammenfassung: | "This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher. |
Beschreibung: | 1 Online-Ressource (xii, 406 p. : ill.) : digital files. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1591409136 (PDF) 9781591409137 (PDF) |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00000380 | ||
003 | IGIG | ||
005 | 20120823103740.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 100523s2006 paua fob 001 0 eng d | ||
010 | |z 2005032072 | ||
020 | |a 1591409136 (PDF) | ||
020 | |a 9781591409137 (PDF) | ||
020 | |z 159140911X (hardcover) | ||
020 | |z 1591409128 (softcover) | ||
020 | |z 9781591409113 (hardcover) | ||
020 | |z 9781591409120 (softcover) | ||
024 | 7 | |a 10.4018/978-1-59140-911-3 |2 doi | |
035 | |a (CaBNVSL)gtp00540489 | ||
035 | |a (OCoLC)707613134 | ||
040 | |a CaBNVSL |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b E5455 2006e | |
082 | 7 | |a 005.8 |2 22 | |
245 | 0 | 0 | |a Enterprise information systems assurance and system security |h [electronic resource] |b managerial and technical issues |c [edited by] Merrill Warkentin and Rayford Vaughn. |
260 | |a Hershey, Pa. : |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |c c2006. | ||
300 | |a 1 Online-Ressource (xii, 406 p. : ill.) : |b digital files. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a 1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy -- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston -- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun -- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya -- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon -- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao -- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor -- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen -- 9. E-commerce security / Steven Furnell -- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville -- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning -- 12. High assurance products in IT security / Rayford B. Vaughn -- 13. The demilitarized zone as an information protection network / Jack J. Murphy -- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed -- | |
505 | 0 | |a 15. Wireless security / Erik Graham, Paul John Steinbart -- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj -- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale -- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering -- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini -- 20. Digital forensics / David A. Dampier, A. Chris Bogen -- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder -- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson -- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis. | |
506 | 1 | |a Restricted to subscribers or individual electronic text purchasers. | |
520 | 3 | |a "This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Title from PDF t.p. (viewed on May 25, 2010). | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Management information systems. | |
700 | 1 | |a Vaughn, Rayford |d 1947- | |
700 | 1 | |a Warkentin, Merrill. | |
710 | 2 | |a IGI Global. | |
776 | 0 | |c Original |z 159140911X |z 9781591409113 |w (DLC) 2005032072 | |
856 | 4 | 8 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3 |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00000380 |
---|---|
_version_ | 1826942589001007104 |
adam_text | |
any_adam_object | |
author2 | Vaughn, Rayford 1947- Warkentin, Merrill |
author2_role | |
author2_variant | r v rv m w mw |
author_corporate | IGI Global |
author_corporate_role | |
author_facet | Vaughn, Rayford 1947- Warkentin, Merrill IGI Global |
author_sort | Vaughn, Rayford 1947- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 E5455 2006e |
callnumber-search | QA76.9.A25 E5455 2006e |
callnumber-sort | QA 276.9 A25 E5455 42006E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | 1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy -- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston -- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun -- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya -- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon -- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao -- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor -- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen -- 9. E-commerce security / Steven Furnell -- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville -- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning -- 12. High assurance products in IT security / Rayford B. Vaughn -- 13. The demilitarized zone as an information protection network / Jack J. Murphy -- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed -- 15. Wireless security / Erik Graham, Paul John Steinbart -- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj -- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale -- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering -- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini -- 20. Digital forensics / David A. Dampier, A. Chris Bogen -- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder -- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson -- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis. |
ctrlnum | (CaBNVSL)gtp00540489 (OCoLC)707613134 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04346nam a2200481 a 4500</leader><controlfield tag="001">ZDB-98-IGB-00000380</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20120823103740.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">100523s2006 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2005032072</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1591409136 (PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781591409137 (PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">159140911X (hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1591409128 (softcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781591409113 (hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781591409120 (softcover)</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59140-911-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00540489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)707613134</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">E5455 2006e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Enterprise information systems assurance and system security</subfield><subfield code="h">[electronic resource] </subfield><subfield code="b">managerial and technical issues </subfield><subfield code="c">[edited by] Merrill Warkentin and Rayford Vaughn.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hershey, Pa. :</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),</subfield><subfield code="c">c2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 406 p. : ill.) :</subfield><subfield code="b">digital files.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy -- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston -- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun -- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya -- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon -- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao -- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor -- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen -- 9. E-commerce security / Steven Furnell -- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville -- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning -- 12. High assurance products in IT security / Rayford B. Vaughn -- 13. The demilitarized zone as an information protection network / Jack J. Murphy -- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed -- </subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">15. Wireless security / Erik Graham, Paul John Steinbart -- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj -- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale -- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering -- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini -- 20. Digital forensics / David A. Dampier, A. Chris Bogen -- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder -- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson -- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis.</subfield></datafield><datafield tag="506" ind1="1" ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Title from PDF t.p. (viewed on May 25, 2010).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vaughn, Rayford</subfield><subfield code="d">1947-</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warkentin, Merrill.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">Original</subfield><subfield code="z">159140911X</subfield><subfield code="z">9781591409113</subfield><subfield code="w">(DLC) 2005032072</subfield></datafield><datafield tag="856" ind1="4" ind2="8"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00000380 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:30:24Z |
institution | BVB |
isbn | 1591409136 (PDF) 9781591409137 (PDF) |
language | English |
oclc_num | 707613134 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 Online-Ressource (xii, 406 p. : ill.) : digital files. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), |
record_format | marc |
spelling | Enterprise information systems assurance and system security [electronic resource] managerial and technical issues [edited by] Merrill Warkentin and Rayford Vaughn. Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2006. 1 Online-Ressource (xii, 406 p. : ill.) : digital files. Includes bibliographical references and index. 1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy -- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston -- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun -- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya -- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon -- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao -- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor -- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen -- 9. E-commerce security / Steven Furnell -- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville -- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning -- 12. High assurance products in IT security / Rayford B. Vaughn -- 13. The demilitarized zone as an information protection network / Jack J. Murphy -- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed -- 15. Wireless security / Erik Graham, Paul John Steinbart -- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj -- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale -- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering -- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini -- 20. Digital forensics / David A. Dampier, A. Chris Bogen -- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder -- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson -- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis. Restricted to subscribers or individual electronic text purchasers. "This book brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Title from PDF t.p. (viewed on May 25, 2010). Computer networks Security measures. Computer security. Management information systems. Vaughn, Rayford 1947- Warkentin, Merrill. IGI Global. Original 159140911X 9781591409113 (DLC) 2005032072 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3 |
spellingShingle | Enterprise information systems assurance and system security managerial and technical issues 1. A model of information security governance for e-business / Dieter Fink, Tobias Huegle, Martin Dortschy -- 2. IT security governance and centralized security controls / Merrill Warkentin, Allen C. Johnston -- 3. A case study of effectively implemented information systems security policy / Charla Griffy-Brown, Mark W. S. Chun -- 4. Malware and antivirus deployment for enterprise security / Raj Sharman, K. Pramod Krishna, H. Raghov Rao, Shambhu Upadhyaya -- 5. The impact of the Sarbanes-Oxley (SOX) Act on information security governance / Sushma Mishra, Gurpreet Dhillon -- 6. A security blueprint for e-business applications / Jun Du, Yuan-Yuan Jiao, Jianxin (Roger) Jiao -- 7. Security management for an e-enterprise / Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor -- 8. Implementing IT security for small and medium enterprises / Edgar R. Weippl, Markus Klemen -- 9. E-commerce security / Steven Furnell -- 10. The survivability principle : IT-enabled dispersal of organizational capital / Andrew Paul P. Snow, Detmar Straub, Carl Stucke, Richard Baskerville -- 11. Security engineering : it is all about control and assurance objectives / Ronda R. Henning -- 12. High assurance products in IT security / Rayford B. Vaughn -- 13. The demilitarized zone as an information protection network / Jack J. Murphy -- 14. Software security engineering : toward unifying software engineering and security engineering / Mohammad Zulkernine, Sheikh I. Ahamed -- 15. Wireless security / Erik Graham, Paul John Steinbart -- 16. Intrusion detection and response / David A. Dampier, Ambareen Siraj -- 17. Deploying honeynets / Ronald C. Dodge, Jr., Daniel Ragsdale -- 18. Steganography and steganalysis / Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering -- 19. Designing secure data warehouses / Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini -- 20. Digital forensics / David A. Dampier, A. Chris Bogen -- 21. A comparison of authentication, authorization and auditing in Windows and Linux / Art Taylor, Lauren Eder -- 22. Taxonomies of user-authentication methods in computer networks / Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson -- 23. Identity management : a comprehensive approach to ensuring a secure network infrastructure / Katherine M. Hollis, David M. Hollis. Computer networks Security measures. Computer security. Management information systems. |
title | Enterprise information systems assurance and system security managerial and technical issues |
title_auth | Enterprise information systems assurance and system security managerial and technical issues |
title_exact_search | Enterprise information systems assurance and system security managerial and technical issues |
title_full | Enterprise information systems assurance and system security [electronic resource] managerial and technical issues [edited by] Merrill Warkentin and Rayford Vaughn. |
title_fullStr | Enterprise information systems assurance and system security [electronic resource] managerial and technical issues [edited by] Merrill Warkentin and Rayford Vaughn. |
title_full_unstemmed | Enterprise information systems assurance and system security [electronic resource] managerial and technical issues [edited by] Merrill Warkentin and Rayford Vaughn. |
title_short | Enterprise information systems assurance and system security |
title_sort | enterprise information systems assurance and system security managerial and technical issues |
title_sub | managerial and technical issues |
topic | Computer networks Security measures. Computer security. Management information systems. |
topic_facet | Computer networks Security measures. Computer security. Management information systems. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-911-3 |
work_keys_str_mv | AT vaughnrayford enterpriseinformationsystemsassuranceandsystemsecuritymanagerialandtechnicalissues AT warkentinmerrill enterpriseinformationsystemsassuranceandsystemsecuritymanagerialandtechnicalissues AT igiglobal enterpriseinformationsystemsassuranceandsystemsecuritymanagerialandtechnicalissues |