Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cyber-security and global information assurance: threat analysis and response solutions
Bookmark Share

Text

Cyber-security and global information assurance: threat analysis and response solutions

Knapp, Kenneth J. - Personal Name;

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities
Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network
Ch.III Insider Threat Prevention, Detection and Mitigation
Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance
Ch.V Security Implications for Management from the Onset of Information Terrorism
Ch.VI The Adoption of Information Security Management Standards: A Literature Review
Ch.VII Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension
Ch.VIII Balancing the Public Policy Drivers in the Tension between Privacy and Security
Ch.IX Human Factors in Security: The Role of Information Security Professionals within Organizations
Ch.X Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations
Ch.XI An Approach to Managing Identity Fraud
Ch.XII A Repeatable Collaboration Process for Incident Response Planning
Ch.XIII Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration
Ch.XIV Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events
Ch.XV An Overview of the Community Cyber Security Maturity Model
Ch.XVI Server Hardening Model Development: A Methodology-Based Approach to Increased System Security
Ch.XVII Trusted Computing: Evolution and Direction
Ch.XVIII Introduction, Classification and Implementation of Honeypots


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 KNA c
b0001419
Available - Available
Detail Information
Series Title
Premier reference source
Call Number
005.8 KNA c
Publisher
Pennsylvania : IGI Global., 2009
Collation
xxii, 434 hal.; ilus.; 29 cm
Language
English
ISBN/ISSN
9781605663265
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Komputer -- Pengamanan
Data protection
Information Technology--Security Measures
Computer networks -- Security measures
Computer security -- Management
Cyberspace -- Security measures
Specific Detail Info
--
Statement of Responsibility
Kenneth J. Knapp
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?