Advances in Enterprise Information Technology Security

Advances in Enterprise Information Technology Security

Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg ) and Francine Herrmann (University Paul Vertaine-Metz, France)
Indexed In: SCOPUS
Release Date: May, 2007|Copyright: © 2007 |Pages: 388
DOI: 10.4018/978-1-59904-090-5
ISBN13: 9781599040905|ISBN10: 1599040905|EISBN13: 9781599040929
Hardcover:
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$148.50
List Price: $165.00
10% Discount:-$16.50
TOTAL SAVINGS: $16.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Applications and operating system software
  • Communication networks and multimedia
  • Computer and client/server systems
  • Database Security and Integrity
  • Enterprise security identity management
  • Enterprise security risk management.
  • Local Area Network Security
  • Phishing
  • Security of collaborative applications
  • Security Policies
Reviews and Testimonials

Khadraoui and Hermann bring together contributions from an international group of active researchers, addressing key challenges in providing enterprise-wide information technology solutions.

– Book News (November 2007)

Advances in Enterprise Information Technology Security is a collection of papers that highlight various issues, problems, and solutions for information technology (IT) security in organizations. It would be a good addition to academic libraries covering these disciplines as well as libraries that support IT and security-related companies, nonprofit organizations, and government agencies.

– American Reference Books Annual, Vol. 39
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Djamel Khadraoui received his PhD from Blaise Pascal University of Clermont-Ferrand (France). He is a senior researcher in the domains of enterprise IT security, intelligent systems, and software architectures. Dr. Khadraoui is also active in the domain of Web-centric and interactive multimedia applications. His recent interests are related to multi-agents systems dealing with negotiation and arbitration applied to the domains of trusted e-contracting. Khadraoui is managing EUREKA projects in the area of telecom and security (BUGYO, RED, €-Confidential, CARLINK, AUTOTRUST). He is the representative of the Security and Trust Management ERCIM working group as well as of the Trust and Security working group of NESSI. He was a general chairman of AISTA04. He is member of ISO JTC1/SC27/WG2 related to IT security techniques/security techniques and mechanisms. He gives lectures at the University of Metz (France) and the Luxembourg University in the area of security.
Francine Herrmann received a PhD in computer science from PARIS-VI University. She worked at CNET Research Center from 1985 to 1988. In 1989, she joined the Computer Science Department of Metz University and the LITA computer science laboratory. She is now the director of the computer science department and manages the master of computer security of Metz. Her main research areas are parallel and distributed algorithms, parallel constraints and security in parallel computations.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.