1st Edition

Encyclopedia of Information Assurance - 4 Volume Set (Print)

    3860 Pages
    by Auerbach Publications

    Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers.

    Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia’s four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource:

    • Supplies the understanding needed to help prevent the misuse of sensitive information
    • Explains how to maintain the integrity of critical systems
    • Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats
    • Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges

    Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats.

    Also Available Online
    This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including:

     Citation tracking and alerts

     Active reference linking

     Saved searches and marked lists

     HTML and PDF format options

    Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages.
    US: (Tel) 1.888.318.2367; (E-mail) [email protected]
    International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]

    Four-Volume Set: Topical Table of Contents

    DATA SECURITY (34 entries)
    Data Classifications
    Databases and Data Warehousing
    Encryption and Cryptography
    Public Key Infrastructure (PKI)

    DIGITAL FORENSICS (35 entries)
    Auditing
    Computer Crime
    Incident Handling
    Investigations
    Malicious Code
    Penetration Testing

    ENTERPRISE CONTINUITY (18 Entries)
    Business Continuity Management
    Business Continuity Planning

    INCIDENT MANAGEMENT (32 entries)
    Attack Methods
    Incident Handling
    Intrusion Detection
    Network Attacks and Countermeasures

    IT SECURITY TRAINING AND AWARENESS (25 entries)
    Ethics
    Planning

    IT SYSTEMS OPERATIONS AND MAINTENANCE (12 entries)

    NETWORK AND TELECOMMUNICATIONS SECURITY (105 entries)
    Access Control
    Access Control Techniques
    Architecture and Design
    Communications and Network Security
    E-Mail Security
    Firewalls
    Identification and Authentication
    Information Flow and Covert Channels
    Internet Security
    Local Area Networks
    Virtual Private Networks
    Voice Communications

    PERSONNEL SECURITY (11 entries)

    PHYSICAL AND ENVIRONMENTAL SECURITY (13 Entries)

    PROCUREMENT (5 Entries)

    REGULATORY STANDARDS COMPLIANCE
    Health Insurance Portability and Accountability Act (HIPAA)
    Information Law
    Policies, Standards, Procedures and Guidelines

    SECURITY RISK MANAGEMENT (20 entries)

    STRATEGIC SECURITY MANAGEMENT (22 entries)

    SYSTEM AND APPLICATION SECURITY (30 entries)
    Application Issues
    Systems Development Controls

    Biography

    Herold, Rebecca; Rogers, Marcus K.

    This four-volume set covers almost every conceivable topic in the arena of information security and secure information management. … Each topic features a brief introduction, similar to an executive summary, followed by associated vocabulary and the history of the topic’s development or inception. … a thorough but concise review expounds relevant material, including key players and the critical information pertaining to the subject. The diagrams are clean and clear and used only when necessary to enhance the presentation of a topic. This is a definitive tome for anyone researching the field of information assurance at an entry level or beyond. … an easy reference to pick up when looking for comprehensive coverage of any term related to security on the side of defense and on the side of attack. The clearly written entries generally provide most of the background necessary, so readers need not search across terms. Both practitioners and faculty would benefit from keeping a copy of this set of books on their shelves. Summing Up: Highly recommended. Graduate students through professionals/practitioners.
    —T. D. Richardson, South University, in CHOICE, Oct. 2011, Vol. 49, #2