Handbook of Research on Information Security and Assurance
Title | Handbook of Research on Information Security and Assurance PDF eBook |
Author | Gupta, Jatinder N. D. |
Publisher | IGI Global |
Pages | 586 |
Release | 2008-08-31 |
Genre | Computers |
ISBN | 1599048566 |
"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Title | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions PDF eBook |
Author | Knapp, Kenneth J. |
Publisher | IGI Global |
Pages | 458 |
Release | 2009-04-30 |
Genre | Computers |
ISBN | 1605663271 |
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Title | Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM PDF eBook |
Author | Sabillon, Regner |
Publisher | IGI Global |
Pages | 260 |
Release | 2020-08-07 |
Genre | Computers |
ISBN | 1799841634 |
With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization’s information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.
Information Assurance and Computer Security
Title | Information Assurance and Computer Security PDF eBook |
Author | J.P. Thomas |
Publisher | IOS Press |
Pages | 216 |
Release | 2006-12-12 |
Genre | Computers |
ISBN | 1607502097 |
Today’s society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the health care system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intellectual property, financial theft or the shut down of infrastructure, computer security attacks that target critical infrastructure such as nuclear power plants has the potential to cause human casualties on a massive and unprecedented scale. This book provides a discussion on a wide variety of viewpoints on some of the main challenges facing secure systems. This book will therefore be of major interest to all researchers in academia or industry with an interest in computer security. It is also relevant to graduate and advanced level undergraduate students who may want to explore the latest developments in the area of computer and information security.
Security for Telecommunications Networks
Title | Security for Telecommunications Networks PDF eBook |
Author | Patrick Traynor |
Publisher | Springer Science & Business Media |
Pages | 185 |
Release | 2008-07-12 |
Genre | Computers |
ISBN | 0387724427 |
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.
Threats, Countermeasures, and Advances in Applied Information Security
Title | Threats, Countermeasures, and Advances in Applied Information Security PDF eBook |
Author | Manish Gupta |
Publisher | |
Pages | 525 |
Release | 2012-01-01 |
Genre | Business enterprises |
ISBN | 9781466609808 |
"This book addresses the fact that managing information security program while effectively managing risks has never been so critical, discussing issues such as emerging threats and countermeasures for effective management of information security in organizations"--Provided by publisher.
Information Assurance and Security Technologies for Risk Assessment and Threat Management
Title | Information Assurance and Security Technologies for Risk Assessment and Threat Management PDF eBook |
Author | Te-Shun Chou |
Publisher | Information Science Reference |
Pages | 0 |
Release | 2012 |
Genre | Computers |
ISBN | 9781613505076 |
"This book details current trends and advances in information assurance and security, as well as explores emerging applications"--Provided by publisher.