Threats, Countermeasures, and Advances in Applied Information Security

Threats, Countermeasures, and Advances in Applied Information Security

Manish Gupta (State University of New York at Buffalo, USA), John Walp (M&T Bank Corporation, USA) and Raj Sharman (State University of New York, USA)
Release Date: April, 2012|Copyright: © 2012 |Pages: 319
DOI: 10.4018/978-1-4666-0978-5
ISBN13: 9781466609785|ISBN10: 1466609788|EISBN13: 9781466609792
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially.

Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while effectively managing risks has never been so critical. This book contains 24 chapters on the most relevant and important issues and advances in applied information security management. The chapters are authored by leading researchers and practitioners in the field of information security from across the globe. The chapters represent emerging threats and countermeasures for effective management of information security at organizations.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Decision Support Systems
  • Distributed And Secure Architecture
  • Graphical Passwords
  • Intrusion Response Metrics
  • Malware Analysis
  • Network security
  • Security and Authentication Issues
  • Software Configurations
  • Spam Robots
  • Threats In E-Commerce
Reviews and Testimonials

The book presents information security management solutions being researched on or deployed through book chapters from leading researchers and practitioners in the field, culminating in chapters of the highest quality.

– Manish Gupta, State University of New York at Buffalo, USA; John Walp, M&T Bank Corporation, USA; and Raj Sharman, State University of New York, USA

– Featured Title on University & College Library News, 2014
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Manish Gupta is an Information Security Professional in a Northeast based bank in US. He was an Adjunct Instructor/Professor (2007) at State University of New York at Buffalo, USA. He received his PhD in Management Science and Systems and an MBA in Information Systems and Finance from State University of New York, Buffalo, NY, USA in 2011 and 2003, respectively. He received his Bachelor’s degree in Mechanical Engineering from Institute of Engineering and Technology, Lucknow, India in 1998. He has more than twelve years of experience in information systems, security policies, and technologies. He has published 4 books in the area of information security, ethics, and assurance. He has published more than 50 research articles in leading journals, conference proceedings, and books including DSS, ACM Transactions, IEEE, and JOEUC. He serves in editorial boards of several international journals including Journal of Electronic Banking and International Journal of Liability and Scientific Enquiry (IJLSE), and has served in program committees of several international conferences. He holds several professional designations including CISSP, CISA, CISM, ISSPCS, CIW Security Analyst, and PMP. He is a member of Sigma Xi, Beta Gamma Sigma, ISACA, and ISC2. He received prestigious 2008 ISC2 information security scholarship (awarded on to only 7 researchers around the world) from ISC2 and also received PhD Student Achievement Award from SUNY Buffalo.
John Walp has more than 17 years of Information Technology experience, more than half of which has been focused on information security challenges. He currently serves as Administrative Vice President and Corporate Information Security Officer for M&T Bank, a $70 billion financial institution headquartered in Buffalo, NY. Previously, he held the role of Vice President, Network Security Solutions Manager for M&T. His responsibilities include forming and executing the overall strategy for Information Security and Privacy at M&T Bank. This includes groups which focus on external and internal network security, which are made up of key security systems such as firewalls, intrusion detection/prevention systems, and security information management platforms. In addition, his organization supports the functions of access management, and compliance and risk management. Mr. Walp was selected as the 2009 North East Information Security Executive of the Year, an honor given by the Executive Alliance. The ISE Northeast Awards recognize information security executives and their teams who demonstrate outstanding leadership in risk management, data asset protection, regulatory compliance, privacy, and network security across the region including the states of Connecticut, Maine, Massachusetts, New Hampshire, New Jersey, New York, Rhode Island, and Vermont. John is a Certified Information Systems Security Professional (CISSP) as well as a Certified Information Security Manager (CISM). He is a graduate of the FBI Citizens Academy and serves as Executive Vice President of the FBI’s Buffalo InfraGard Membership Alliance. Mr. Walp also serves on the advisory board of the Center of Excellence in Information Systems Assurance Research and Education (CEISARE) at the University of Buffalo. He is a member of the High-Tech Crime Consortium and the U.S. Secret Services Electronic Crimes Task Force. A Veteran of the United State Air Force, he served his country for 22 years which included both active and reserve service. In 2004, Mr. Walp was recalled to active duty and deployed to the Kingdom of Kuwait in support of Operation Iraqi Freedom and Operation Enduring Freedom. He was selected as part of an elite logistics cadre to aid in establishing the Central Command’s Deployment and Distribution Operations Center. He holds a Bachelor of Science in Computer Information Systems from State University of New York College at Buffalo. He and his wife Laurie have four children and make their home in Amherst, NY.
Raj Sharman is an associate professor in the Management Science and Systems Department at SUNY Buffalo, NY. He received his B. Tech and M. Tech degree from IIT Bombay (India) and his M.S degree in Industrial Engineering and PhD in Computer Science from Louisiana State University. His research streams include information assurance, extreme events, and improving performance on the Web. His papers have been published in a number of national and international journals. He is also the recipient of several grants from the university as well as external agencies. He serves as an associate editor for the Journal of Information Systems Security.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.