Threats Countermeasures And Advances In Applied Information Security


Download Threats Countermeasures And Advances In Applied Information Security PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Threats Countermeasures And Advances In Applied Information Security book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Threats, Countermeasures, and Advances in Applied Information Security


Threats, Countermeasures, and Advances in Applied Information Security

Author: Gupta, Manish

language: en

Publisher: IGI Global

Release Date: 2012-04-30


DOWNLOAD





Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially. Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while effectively managing risks has never been so critical. This book contains 24 chapters on the most relevant and important issues and advances in applied information security management. The chapters are authored by leading researchers and practitioners in the field of information security from across the globe. The chapters represent emerging threats and countermeasures for effective management of information security at organizations.

Network Security Technologies: Design and Applications


Network Security Technologies: Design and Applications

Author: Amine, Abdelmalek

language: en

Publisher: IGI Global

Release Date: 2013-11-30


DOWNLOAD





Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Design, Development, and Use of Secure Electronic Voting Systems


Design, Development, and Use of Secure Electronic Voting Systems

Author: Zissis, Dimitrios

language: en

Publisher: IGI Global

Release Date: 2014-03-31


DOWNLOAD





In modern electoral processes, Information and Communication Technologies play a crucial role, whether used in voter registration, ballot casting, or processing of results. Securing these systems is a necessary step in ensuring the fairness of the democratic process. Design, Development, and Use of Secure Electronic Voting Systems analyzes current research on the integration of modern technologies with traditional democratic systems, providing a framework for designing and deploying electronic voting systems in any context or society. Stakeholders, researchers, architects, designers, and scholars interested in the use of electronic systems in government processes will use this book to gain a broader understanding of some of the latest advances in this emerging field.