Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

Indexed In: SCOPUS
Release Date: December, 2011|Copyright: © 2012 |Pages: 371
DOI: 10.4018/978-1-61350-507-6
ISBN13: 9781613505076|ISBN10: 1613505078|EISBN13: 9781613505083
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information.

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information assurance and security, as well as explores emerging applications. The book aims to provides the readers with an opportunity to build a strong, fundamental understanding of theory and methods and, thus, to find solutions for many of today’s most interesting and challenging problems regarding information assurance and security.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Access Control
  • Attacks
  • Authentication
  • Biometric System
  • Cryptography
  • Firewall
  • Intrusion Detection and Prevention
  • Threats
  • Virtual Private Network
  • Vulnerabilities
  • Wireless Security
Reviews & Statements

The challenges in information assurance are both difficult and interesting. People are working on them with enthusiasm, tenacity, and dedication to develop new methods of analysis and provide new solutions to keep up with the ever-changing threats. In this new age of global interconnectivity and interdependence, it is necessary to provide security practitioners, both professionals and students, with state-of-the art knowledge on the frontiers in information assurance. This book is a good step in that direction.

– Qinghan Xiao, Defence R&D, Canada
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Te-Shun Chou received his Bachelor degree in Electronics Engineering from Feng Chia University, Taiwan, R.O.C. in 1989, and the Master’s degree and Doctoral degree both in Electrical Engineering from Florida International University, Miami, Florida in 1992 and 2007, respectively. In 2008, he joined East Carolina University, Greenville, North Carolina, where he is currently an Assistant Professor with the Department of Technology Systems. His research interests include soft computing, wireless sensor network, and network security, especially intrusion detection and incident response.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
  • Yoohwan Kim, University of Nevada Las Vegas, USA
  • Phil Lunsford, East Carolina University, USA
  • Jun Luo, ETS-Lindgen – An ESCO Technologies Company, USA
  • Kami Makki, Lamar University, USA
  • Kia Makki, Technological University of America, USA
  • Tijjani Mohammed, East Carolina University, USA
  • Qinghan Xiao, Defence R&D Canada – Ottawa, Canada
  • Kang K. Yen, Florida International University, USA