Computer Security / Edition 3

Computer Security / Edition 3

5.0 1
by John M. Carroll, Carroll
     
 

Computer Security, Third Edition presents the best ideas that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This completley updated book contains new information on advances in computer equipment and the spread of technology. It is an essential text for everyone involved with the

See more details below

Overview

Computer Security, Third Edition presents the best ideas that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This completley updated book contains new information on advances in computer equipment and the spread of technology. It is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses.

An updated of the classic book by Butterworth-Heinemann with new material on recent advances in computer hardware and the spread of personal computer technology.
A complete and comprehensive introduction to computer security.
Includes coverage on computer crime, physical security, communications, systems security, and risk management.

Product Details

ISBN-13:
9780750696005
Publisher:
Elsevier Science
Publication date:
12/22/1995
Edition description:
REV
Pages:
648
Product dimensions:
6.14(w) x 9.21(h) x 1.44(d)

Table of Contents

Part I.THE THREAT TO COMPUTER SECURITY, 1 Essentials of Computer Security, 2 Computer Crime and the Law, Part II.SECURITY MANAGEMENT CONSIDERATIONS, 3 Organizing for Information Management,4 Protection of matter, 5 Screening and Management of Personnel, 6 Physical Access Control, 7 Physical Security, 8 Environmental, 9 Disaster Control, Part III. COMMUNICATIONS SECURITY, 10 Line Security, 11 Transmission Security, 12 Cryptographic Security, 13 Emanations, 14 Technical Security, Part IV.
SYSTEMS SECURITY, 15 Systems Identification, 16 Isolation in computer systems, 17 Systems Access Control, 18 Detection and Surveillance, 19 Systems Integrity, 20 Systems Reliability and Security, 21 Security and Personal Computers, Part V. INFORMATION SECURITY RISK ANALYSIS, 22 Systems Approach to Risk Management, 23 Threat Assessment, 24 Assets and Safeguards, 25 Keeping Secrets in Computers, 26 Modes of Risk Analysis, Appendix: Sample Log Forms, Glossary, Selected Bibliography, Index.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >