Text
Cyber-security and global information assurance: threat analysis and response solutions
Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities
Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network
Ch.III Insider Threat Prevention, Detection and Mitigation
Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance
Ch.V Security Implications for Management from the Onset of Information Terrorism
Ch.VI The Adoption of Information Security Management Standards: A Literature Review
Ch.VII Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension
Ch.VIII Balancing the Public Policy Drivers in the Tension between Privacy and Security
Ch.IX Human Factors in Security: The Role of Information Security Professionals within Organizations
Ch.X Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations
Ch.XI An Approach to Managing Identity Fraud
Ch.XII A Repeatable Collaboration Process for Incident Response Planning
Ch.XIII Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration
Ch.XIV Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events
Ch.XV An Overview of the Community Cyber Security Maturity Model
Ch.XVI Server Hardening Model Development: A Methodology-Based Approach to Increased System Security
Ch.XVII Trusted Computing: Evolution and Direction
Ch.XVIII Introduction, Classification and Implementation of Honeypots
No other version available