Indices1
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

Copyright: © 2012 |Pages: 371
ISBN13: 9781613505076|ISBN10: 1613505078|EISBN13: 9781613505083
DOI: 10.4018/978-1-61350-507-6
Cite Book Cite Book

MLA

Chou, Te-Shun, editor. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances. IGI Global, 2012. https://doi.org/10.4018/978-1-61350-507-6

APA

Chou, T. (Ed.). (2012). Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances. IGI Global. https://doi.org/10.4018/978-1-61350-507-6

Chicago

Chou, Te-Shun, ed. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-507-6

Export Reference

Mendeley
Favorite Full-Book Download

The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information.

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information assurance and security, as well as explores emerging applications. The book aims to provides the readers with an opportunity to build a strong, fundamental understanding of theory and methods and, thus, to find solutions for many of today’s most interesting and challenging problems regarding information assurance and security.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Attacks and Vulnerabilities
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Security Technologies  (pages 46-46)
Security Technologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Risk Assessment and Management
This content has been removed at the discretion of the publisher and the editors.
Strategic Planning of Information Security
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.