Handbook of Research on Information Security and Assurance

Handbook of Research on Information Security and Assurance

Indexed In: SCOPUS View 1 More Indices
Release Date: August, 2008|Copyright: © 2009 |Pages: 586
DOI: 10.4018/978-1-59904-855-0
ISBN13: 9781599048550|ISBN10: 1599048558|EISBN13: 9781599048567
Hardcover:
Available
$265.00
TOTAL SAVINGS: $265.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$265.00
TOTAL SAVINGS: $265.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$265.00
TOTAL SAVINGS: $265.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$265.00
TOTAL SAVINGS: $265.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$320.00
TOTAL SAVINGS: $320.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$320.00
TOTAL SAVINGS: $320.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.

The Handbook of Research on Information Security and Assurance includes 47 chapters offering comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by over 90 scholars in information science, this reference provides tools to combat the growing risk associated with technology.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Aomaly detection
  • Bioterrism and biosecurity
  • Cryptography for information security
  • Cyber hijacking
  • Data security for storage area networks
  • Enterprise security federation
  • Enterprise VoIP security
  • Ethical concerns in security
  • Firewalls
  • Human factors in information security
  • Information availability
  • Information security assurance
  • Information security research
  • Information systems risk management
  • Information Warfare
  • Internal auditing for information assurance
  • Memory corruption attacks
  • Network Monitoring
  • Security policies and procedures
  • Security risks and counter risks
Reviews & Statements

The coverage of this handbook of research on information assurance and security provides a reference resource for both information science and technology researchers and also decision makers in obtaining a greater understanding of the concepts, issues, problems, trends, challenges and opportunities related to this field of study.

– Jatinder N. D. Gupta, University of Alabama, USA

Each article includes full references, making this a good source of research topics as well as a handbook.

– Book News Inc. (December 2008)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Jatinder (Jeet) N. D. Gupta is currently eminent scholar of management of technology, professor of management information systems, industrial and systems engineering and engineering management at The University of Alabama in Huntsville, Huntsville, Alabama. Most recently, he was professor of management, information and communication sciences, and industry and technology at Ball State University, Muncie, Indiana. He holds a PhD in industrial engineering (with specialization in production management and information systems) from Texas Tech University. Co-author of a textbook in Operations Research, Dr. Gupta serves on the editorial boards of several national and international journals. Recipient of the Outstanding Faculty and Outstanding Researcher awards from Ball State University, he has published numerous papers in such journals as Journal of Management Information Systems, International Journal of Information Management, Operations Research, INFORMS Journal of Computing, Annals of Operations Research, and Mathematics of Operations Research. More recently, he served as a co-editor of several special issues including the Neural Networks in Business of Computers and Operations Research, Semiconductor Wafer Production, special issue of Production Planning and Control, and Design, Building and Evaluation of Intelligent Decision Making Support Systems: Special Issue of Journal of Decision Systems. He co-edited books that included Decision Making Support Systems: Achievements and Challenges for the New Decade and Creating Knowledge-based Healthcare Organizations published by Idea Group Publishing. He is also the coeditor of the book: Managing E-Business published by Heidelberg Press, Heidelberg, Australia and the book: Intelligent Decision-making Support Systems, published by Springer. His current research interests include information security, e-commerce, supply chain management, information and decision technologies, scheduling, planning and control, organizational learning and effectiveness, systems education, knowledge management, and enterprise integration. Dr. Gupta has held elected and appointed positions in several academic and professional societies including the Association for Information Systems, Production and Operations Management Society (POMS), the Decision Sciences Institute (DSI), and the Information Resources Management Association (IRMA).
Sushil K. Sharma is currently Associate Dean and Professor of Information Systems and Executive Director of the MBA and Certificate Programs at the Miller College of Business, Ball State University (Muncie, Indiana, USA). He co-edited five books that include the Handbook of Research on Information Assurance and Security and Creating Knowledge-based Healthcare Organizations. He is also the co-editor of the book: Managing E-Business (Heidelberg Press, Australia). Dr. Sharma has authored over 100 refereed research papers in many peer-reviewed national and international MIS and management journals, conferences proceedings and books. He serves on editorial boards of several national and international journals and has also edited special issues. He is the founding Editor-in-Chief of the International Journal of E-Adoption. His primary teaching and research interests are in e-commerce, computer-mediated communications, community and social informatics, information systems security, e-government, ERP systems, database management systems, cluster computing, Web services and knowledge management. He has a wide consulting experience in information systems and e-commerce and he has served as an advisor and consultant to several government and private organizations including projects funded by the World Bank.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
  • Elisa Bertino, Purdue University, USA
  • Queen Booker, Minnesota State University, Mankato, USA
  • Mei Cao, Arkansas State University, USA
  • Amita Goyal Chin, Virginia Commonwealth University, USA
  • Gurpreet Dhillon, Virginia Commonwealth University, USA
  • Sanjay Goel, State University of New York, USA
  • Ajay K. Gupta, Gsecurity, USA
  • Sushil Jajodia, George Mason University, USA
  • Stephan Jones, Ball State University, USA
  • Shivraj Kanungo, George Washington University, USA
  • Pradeep Khosla, Carnegie Mellon University, USA
  • Ronlad Kovac, Ball State University, USA
  • Vipin Kumar, University of Minnesota, USA
  • Eldon Y. Li, National Chengchi University, Taiwan
  • Dengpan Liu, University of Alabama in Huntsville, USA
  • Herbert J. Mattord, Kennesaw State University, USA
  • P.K. Mahanti, University of New Brunswick, Canada
  • Joon S. Park, Syracuse University, USA
  • Mike Raisinghani, Texas Woman's University, USA
  • M. K. Raja, University of Texas at Arlington, USA
  • Rajeev Raje, Indiana University Purdue University Indianapolis, USA
  • Rathindra Sarathy, Oklahoma State University, USA
  • Mohini Singh, RMIT, Australia
  • Jim Tiller, (ISC)2 Journal, USA
  • Vijay Varadharajan, Macquarie University, Australia
  • Mark Weiser, Oklahoma State University, USA
  • Michael Whitman, Kennesaw State University, USA
  • Branden Williams, VeriSign, USA
  • John Zeleznikow, Victoria University, Australia