Security Management, Integrity, and Internal Control in Information Systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference - Steve Furnell

Security Management, Integrity, and Internal Control in Information Systems

IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

By: Steve Furnell (Editor), Paul Dowland (Editor), Bhavani Thuraisingham (Editor)

Paperback | 29 November 2010

At a Glance

Paperback


$260.60

or 4 interest-free payments of $65.15 with

 or 

Aims to ship in 7 to 10 business days

Security Standards.- Information Security Standards: Adoption Drivers (Invited Paper).- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).- From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper).- Security Culture.- How Much Should We Pay for Security? (Invited Paper).- Do Not Ship, or Receive, Trojan Horses.- Employee Security Perception in Cultivating Information Security Culture.- Access Management.- A Policy Framework for Access Management in Federated Information Sharing.- A Hierarchical Release Control Policy Framework.- Risk Management.- Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC.- The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study.- Risk Communication, Risk Perception and Information Security.- A Holistic Risk Analysis Method for Identifying Information Security Risks.- Security Culture.- A Responsibility Framework for Information Security.- Information Security Governance - A Re-Definition.- Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper).- Security Management.- Measurement of Information Security in Processes and Products.- A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises.- A UML Approach in the ISMS Implementation.- Applications.- Attack Aware Integrity Control in Databases (Invited Abstract).- Characteristics and Measures for Mobile-Masquerader Detection.- A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.- Access Management.- A Trust-Based Model for Information Integrity in Open Systems.- Scalable Access Policy Administration (Invited Paper).- Semantic Information Infrastructure Protection (Invited Abstract).

Other Editions and Formats

Hardcover

Published: 29th November 2005

More in Data Encryption

There's No Such Thing as Crypto Crime : An Investigative Handbook - Nick Furneaux
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $159.95

$130.75

18%
OFF
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Management of Information Security : 6th edition - Michael E. Whitman

RRP $144.95

$119.75

17%
OFF
Corporate Computer Security Global Edition : 4th Edition - Randall Boyle
How to Measure Anything in Cybersecurity Risk - Douglas W. Hubbard

RRP $99.95

$70.90

29%
OFF
Encyclopedia of Cyber Warfare - Paul J. Springer

RRP $260.00

$216.25

17%
OFF
Alice and Bob Learn Secure Coding - Tanya Janca

RRP $82.95

$60.75

27%
OFF
The Language of Cyber Attacks : A Rhetoric of Deception - Aaron Mauro
Blockchain : Blueprint for a New Economy - Melanie Swa

RRP $66.50

$30.75

54%
OFF
Principles of Information Security : 6th Edition - Michael E. Whitman

RRP $149.95

$129.95

13%
OFF