Indices1
Advances in Enterprise Information Technology Security

Advances in Enterprise Information Technology Security

Copyright: © 2007 |Pages: 388
ISBN13: 9781599040905|ISBN10: 1599040905|EISBN13: 9781599040929
DOI: 10.4018/978-1-59904-090-5
Cite Book Cite Book

MLA

Khadraoui, Djamel, and Francine Herrmann, editors. Advances in Enterprise Information Technology Security. IGI Global, 2007. https://doi.org/10.4018/978-1-59904-090-5

APA

Khadraoui, D. & Herrmann, F. (Eds.). (2007). Advances in Enterprise Information Technology Security. IGI Global. https://doi.org/10.4018/978-1-59904-090-5

Chicago

Khadraoui, Djamel, and Francine Herrmann, eds. Advances in Enterprise Information Technology Security. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-090-5

Export Reference

Mendeley
Favorite Full-Book Download

Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Security Architectures  (pages 19-19)
Security Architectures
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Trust, Privacy, and Authorization
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Threat  (pages 189-189)
Threat
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Risk Management  (pages 260-260)
Risk Management
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.