Information Assurance and Security Technologies for Risk Assessment and Threat Management

Advances

Nonfiction, Computers, Internet, Security, Application Software, Computer Security, General Computing
Cover of the book Information Assurance and Security Technologies for Risk Assessment and Threat Management by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466605008
Publisher: IGI Global Publication: December 31, 2011
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466605008
Publisher: IGI Global
Publication: December 31, 2011
Imprint: Information Science Reference
Language: English
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information assurance and security, as well as explores emerging applications. The book aims to provides the readers with an opportunity to build a strong, fundamental understanding of theory and methods and, thus, to find solutions for many of today’s most interesting and challenging problems regarding information assurance and security.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information assurance and security, as well as explores emerging applications. The book aims to provides the readers with an opportunity to build a strong, fundamental understanding of theory and methods and, thus, to find solutions for many of today’s most interesting and challenging problems regarding information assurance and security.

More books from IGI Global

Cover of the book Handbook of Research on Improving Learning and Motivation through Educational Games by
Cover of the book Dynamic Advancements in Teaching and Learning Based Technologies by
Cover of the book Emerging Issues and Prospects in African E-Government by
Cover of the book Actor-Network Theory and Technology Innovation by
Cover of the book Geotechnical Applications for Earthquake Engineering by
Cover of the book Changing the Scope of Library Instruction in the Digital Age by
Cover of the book Sustaining Power Resources through Energy Optimization and Engineering by
Cover of the book Discrimination and Diversity by
Cover of the book Intelligent Analysis of Multimedia Information by
Cover of the book 3D Printing and Its Impact on the Production of Fully Functional Components by
Cover of the book Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing by
Cover of the book Green Approaches to Biocomposite Materials Science and Engineering by
Cover of the book Chaos Synchronization and Cryptography for Secure Communications by
Cover of the book Virtual Reality Enhanced Robotic Systems for Disability Rehabilitation by
Cover of the book Building Brand Equity and Consumer Trust Through Radical Transparency Practices by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy