Reference Hub2
Indices2
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues

Copyright: © 2006 |Pages: 406
ISBN13: 9781591409113|ISBN10: 159140911X|EISBN13: 9781591409137|ISBN13 Softcover: 9781591409120
DOI: 10.4018/978-1-59140-911-3
Cite Book Cite Book

MLA

Warkentin, Merrill, and Rayford Vaughn, editors. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. IGI Global, 2006. https://doi.org/10.4018/978-1-59140-911-3

APA

Warkentin, M. & Vaughn, R. (Eds.). (2006). Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. IGI Global. https://doi.org/10.4018/978-1-59140-911-3

Chicago

Warkentin, Merrill, and Rayford Vaughn, eds. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. Hershey, PA: IGI Global, 2006. https://doi.org/10.4018/978-1-59140-911-3

Export Reference

Mendeley
Favorite Full-Book Download

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges in the IT field – how to create secure environments for the application of technology to serve future needs.

This book bridges the gap between theory and practice, academia and industry, computer science and MIS. The chapters provide an integrated, holistic perspective on this complex set of challenges, supported with practical experiences of leading figures from all realms. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues provides an excellent collection for corporate executives who are charged with securing their systems and data, students studying the topic of business information security, and those who simply have an interest in this exciting topic.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Security Policy and Management
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Security Implications for Business
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Security Engineering  (pages 167-167)
Security Engineering
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Security Technologies  (pages 252-252)
Security Technologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Authentication Issues  (pages 325-325)
Authentication Issues
This content has been removed at the discretion of the publisher and the editors.
Back Materials
About the Authors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.