Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

Indexed In: SCOPUS View 1 More Indices
Release Date: April, 2009|Copyright: © 2009 |Pages: 458
DOI: 10.4018/978-1-60566-326-5
ISBN13: 9781605663265|ISBN10: 1605663263|EISBN13: 9781605663272
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.

Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Cyber security threat problem
  • Global information assurance
  • Human factors in security
  • Information security management standards
  • Information Sharing
  • Insider threat prevention, detection, and mitigation
  • Managing identity fraud
  • Onset of information terrorism
  • Public policy drivers
  • Security implications for management
  • Threat identification of an enterprise network
Reviews & Statements

This book stresses the global nature of cyber security problems; in doing so, each chapter provides an analysis of specific threats facing society with proposed solutions. Ultimately, this book will facilitate international cooperation to help build a more secure future in cyberspace.

– Kenneth J. Knapp, U.S. Air Force Academy, USA

Each chapter has gone through a double blind review, with contributors responding to comments from at least three external reviewers.

– Book News Inc. (June 2009)

The book has several great qualities. First, it contains an excellent set of papers that are well written, current, and accurate. Second, the authors are from all over the world and the book, therefore, truly has a global point of view. From a format perspective, the compilation of each chapters' reference list into a single bibliography at the end of the book is a great touch and extraordinarily useful, and the index is outstanding.

– Reviewed by Gary C. Kessler, Champlain College USA
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Kenneth J. Knapp is the Deputy Head of the Department of Management at the U.S. Air Force Academy, Colorado. He has over 20 years of experience working with information technology and security in the U. S. Air Force. He earned a Bachelor of Science in Computer Science from DeSales University in Pennsylvania, an MBA from Auburn University at Montgomery and a PhD in the Management of Information Technology from Auburn University, Alabama. Dr. Knapp has published in outlets such as the International Journal of Information Security & Privacy, Information Management & Computer Security, Communications of the Association for Information Systems, Information Systems Management, Information Systems Security, and the Journal of Digital Forensics, Security and Law. His research has also appeared in numerous chapter books such as the Information Security Management Handbook, 2007 and 2008 editions, edited by Hal Tipton and Micki Krause. He has presented his research at numerous conferences to include annual RSA conferences. Dr. Knapp’s research results have appeared in online media outlets such as CIO, CSO, Networkworld and Computerworld and he has won numerous research and teaching awards. He recently accepted a tenure-track position in the Information and Technology Management Department at The University of Tampa, Florida.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
  • Mark Barner, USAF Academy, USA
  • Jeff L. Boleng, USAF Academy, USA
  • Steve Chadwick, Intel Corporation, USA
  • Andrew Colarik, Information Security Consultant, USA
  • John K. Corley II, Appalachian State University, USA
  • Kevin Curran, University of Ulster, Magee College, N. Ireland
  • Gary Denney, USAF Academy, USA
  • Ronald Dodge, United States Military Academy, USA
  • Claudia J. Ferrante, USAF Academy, USA
  • Dieter Fink, Edith Cowan University, Australia
  • F. Nelson Ford, Auburn University, USA
  • Michael R. Grimaila, Air Force Institute of Technology, USA
  • Matthew M. Hinkle, The Society of Exploration Geophysicists, USA
  • Rita A Jordan, USAF Academy, USA
  • Mansoor Khan, Thamesteel Limited, UK
  • Gary Klein, University of Colorado, USA
  • Thomas E. Marshall, Auburn University, USA
  • R. Frank Morris, Jr., The Citadel, USA
  • R. Kelly Rainer, Jr., Auburn University, USA
  • Nancy M. Rower, USAF Academy, USA
  • Kassem Saleh, Kuwait University, Kuwait
  • Evelyn Thrasher, Western Kentucky University, USA
  • Hal Tipton, CISSP, USA
  • Matthew Warren, Deakin University, Australia
  • Michael Weeks, The University of Tampa, USA
  • Additional Reviewers

  • Shane Balfe, University of London, UK
  • John Bell, United States Air Force, USA
  • Barry Brewer, United States Air Force, USA
  • Ram Dantu, University of North Texas, USA
  • Sharon Heilmann, United States Air Force Academy, USA
  • Bart Hubbs, Hospital Corporation of American, USA
  • David Levy, United States Air Force Academy, USA
  • Steven Noel, George Mason University, USA
  • Matt B. Palmer, Michigan State University, USA
  • Doug Patton, United States Air Force Academy, USA
  • Paul Powenski, BT/INS International Network Services, UK
  • Pat P. Rieder, United States Air Force Academy, USA