Reference Hub6
Indices2
Handbook of Research on Information Security and Assurance

Handbook of Research on Information Security and Assurance

Copyright: © 2009 |Pages: 586
ISBN13: 9781599048550|ISBN10: 1599048558|EISBN13: 9781599048567
DOI: 10.4018/978-1-59904-855-0
Cite Book Cite Book

MLA

Gupta, Jatinder N. D., and Sushil Sharma, editors. Handbook of Research on Information Security and Assurance. IGI Global, 2009. https://doi.org/10.4018/978-1-59904-855-0

APA

Gupta, J. N. & Sharma, S. (Eds.). (2009). Handbook of Research on Information Security and Assurance. IGI Global. https://doi.org/10.4018/978-1-59904-855-0

Chicago

Gupta, Jatinder N. D., and Sushil Sharma, eds. Handbook of Research on Information Security and Assurance. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-855-0

Export Reference

Mendeley
Favorite Full-Book Download

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.

The Handbook of Research on Information Security and Assurance includes 47 chapters offering comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by over 90 scholars in information science, this reference provides tools to combat the growing risk associated with technology.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Enterprise Security  (pages 28-28)
Enterprise Security
This content has been removed at the discretion of the publisher and the editors.
Security Approaches, Frameworks, Tools, and Technologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Security Policies and Procedures
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Mitigating Security Risks  (pages 381-381)
Mitigating Security Risks
This content has been removed at the discretion of the publisher and the editors.
Back Materials
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.