1st Edition
Encyclopedia of Information Assurance - 4 Volume Set (Print)
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers.
Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia’s four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource:
- Supplies the understanding needed to help prevent the misuse of sensitive information
- Explains how to maintain the integrity of critical systems
- Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats
- Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges
Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats.
Also Available Online
This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including:
Citation tracking and alerts
Active reference linking
Saved searches and marked lists
HTML and PDF format options
Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages.
US: (Tel) 1.888.318.2367; (E-mail) [email protected]
International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]
Four-Volume Set: Topical Table of Contents
DATA SECURITY (34 entries)
Data Classifications
Databases and Data Warehousing
Encryption and Cryptography
Public Key Infrastructure (PKI)
DIGITAL FORENSICS (35 entries)
Auditing
Computer Crime
Incident Handling
Investigations
Malicious Code
Penetration Testing
ENTERPRISE CONTINUITY (18 Entries)
Business Continuity Management
Business Continuity Planning
INCIDENT MANAGEMENT (32 entries)
Attack Methods
Incident Handling
Intrusion Detection
Network Attacks and Countermeasures
IT SECURITY TRAINING AND AWARENESS (25 entries)
Ethics
Planning
IT SYSTEMS OPERATIONS AND MAINTENANCE (12 entries)
NETWORK AND TELECOMMUNICATIONS SECURITY (105 entries)
Access Control
Access Control Techniques
Architecture and Design
Communications and Network Security
E-Mail Security
Firewalls
Identification and Authentication
Information Flow and Covert Channels
Internet Security
Local Area Networks
Virtual Private Networks
Voice Communications
PERSONNEL SECURITY (11 entries)
PHYSICAL AND ENVIRONMENTAL SECURITY (13 Entries)
PROCUREMENT (5 Entries)
REGULATORY STANDARDS COMPLIANCE
Health Insurance Portability and Accountability Act (HIPAA)
Information Law
Policies, Standards, Procedures and Guidelines
SECURITY RISK MANAGEMENT (20 entries)
STRATEGIC SECURITY MANAGEMENT (22 entries)
SYSTEM AND APPLICATION SECURITY (30 entries)
Application Issues
Systems Development Controls
Biography
Herold, Rebecca; Rogers, Marcus K.
This four-volume set covers almost every conceivable topic in the arena of information security and secure information management. … Each topic features a brief introduction, similar to an executive summary, followed by associated vocabulary and the history of the topic’s development or inception. … a thorough but concise review expounds relevant material, including key players and the critical information pertaining to the subject. The diagrams are clean and clear and used only when necessary to enhance the presentation of a topic. This is a definitive tome for anyone researching the field of information assurance at an entry level or beyond. … an easy reference to pick up when looking for comprehensive coverage of any term related to security on the side of defense and on the side of attack. The clearly written entries generally provide most of the background necessary, so readers need not search across terms. Both practitioners and faculty would benefit from keeping a copy of this set of books on their shelves. Summing Up: Highly recommended. Graduate students through professionals/practitioners.
—T. D. Richardson, South University, in CHOICE, Oct. 2011, Vol. 49, #2