"This book addresses the fact that managing information security program while effectively managing risks has never been so critical, discussing issues such as emerging threats and countermeasures for effective management of information security in organizations"--Provided by publisher.
The 24 papers in this collection discuss both theoretical aspects of information security management and the real-world implications and implementations of the research. Contributors present tools for privacy risk assessment and compliance, software configuration security appraisal, a proxy smart card system, privacy policy creation and comparison, multi-level information splitting, malware analysis, and decentralized enforcement of network security. Other chapters explore graphical passwords, SQL injection attack countermeasures, scrambled CAPTCHA, collaborative enterprise security, electronic voting systems, and mobile codes for wireless sensor networks. Two of the editors are affiliated with the State University of New York at Buffalo. Annotation ©2012 Book News, Inc., Portland, OR (booknews.com)