Coverart for item
The Resource Cyber-security and global information assurance : threat analysis and response solutions, Kenneth J. Knapp [editor]

Cyber-security and global information assurance : threat analysis and response solutions, Kenneth J. Knapp [editor]

Label
Cyber-security and global information assurance : threat analysis and response solutions
Title
Cyber-security and global information assurance
Title remainder
threat analysis and response solutions
Statement of responsibility
Kenneth J. Knapp [editor]
Contributor
Subject
Language
eng
Summary
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher
Member of
Dewey number
005.8
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1966-
http://library.link/vocab/relatedWorkOrContributorName
Knapp, Kenneth J.
Series statement
  • Advances in information security and privacy series
  • Premier reference source
http://library.link/vocab/subjectName
  • Information technology
  • Computer security
  • Cyberspace
  • Data protection
  • Computer networks
Label
Cyber-security and global information assurance : threat analysis and response solutions, Kenneth J. Knapp [editor]
Instantiates
Publication
Note
"Premier reference source."
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Color
multicolored
Contents
  • 1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez -- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh -- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila -- 4. An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke -- 5. Security implications for management from the onset of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin -- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner -- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby -- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano -- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen -- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester -- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron -- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya
  • 14. Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee -- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson -- 16. Server hardening model development / Doug White, Alan Rea -- 17. Trusted computing / Jeff Teo -- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez
Control code
ocn319547615
Dimensions
unknown
Extent
1 online resource (xxii, 434 pages)
File format
unknown
Form of item
online
Isbn
9781605663272
Level of compression
unknown
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)319547615
Label
Cyber-security and global information assurance : threat analysis and response solutions, Kenneth J. Knapp [editor]
Publication
Note
"Premier reference source."
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Color
multicolored
Contents
  • 1. Dynamic modeling of the cyber security threat problem / Jaziar Radianti, Jose Gonzalez -- 2. An attack graph based approach for threat identification of an enterprise network / Somak Bhattacharya, Samresh Malhotra, S. Ghosh -- 3. Insider threat prevention, detection and mitigation / Robert Mills, Gilbert Peterson, Michael Grimaila -- 4. An autocorrelation methodology for the assessment of security assurance / Richard Gordon, Allison Gehrke -- 5. Security implications for management from the onset of information terrorism / Ken Webb -- 6. The adoption of information security management standards / Yves Barlette, Vladislav Fomin -- 7. Data smog, techno creep and the hobbling of the cognitive dimension / Peter Marksteiner -- 8. Balancing the public policy drivers in the tension between privacy and security / John Bagby -- 9. Human factors in security / Indira Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano -- 10. Diagnosing misfits, inducing requirements, and delineating transformations within computer network operations organizations / Nikolaos Bekatoros HN, Jack Koons III, Mark Nissen -- 11. An approach to managing identity fraud / Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester -- 12. A repeatable collaboration process for incident response planning / Alanah Davis, Gert-Jan de Vreede, Leah Pietron -- 13. Pandemic influenza, worker absenteeism and impacts on critical infrastructures / Dean Jones, Linda Nozick, Mark Turnquist, William Sawaya
  • 14. Information sharing / Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee -- 15. An overview of the community cyber security maturity model / Gregory White, Mark Huson -- 16. Server hardening model development / Doug White, Alan Rea -- 17. Trusted computing / Jeff Teo -- 18. Introduction, classification and implementation of honeypots / Miguel Hernandez y Lopez, Carlos Lerma Resendez
Control code
ocn319547615
Dimensions
unknown
Extent
1 online resource (xxii, 434 pages)
File format
unknown
Form of item
online
Isbn
9781605663272
Level of compression
unknown
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)319547615

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...