Skip to content

Computer Security

ISBN-10: 0750692251

ISBN-13: 9780750692250

Edition: 2nd

Authors: John M. Carroll

List price: $45.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Computer Security, Third Edition presents the best ideas that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This completley updated book contains new information on advances in computer equipment and the spread of technology. It is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. An updated of the classic book by Butterworth-Heinemann with new material on recent advances in computer hardware and the spread of personal computer technology. A complete and comprehensive introduction to computer security. Includes coverage on computer crime, physical security, communications, systems security, and risk management.
Customers also bought

Book details

List price: $45.00
Edition: 2nd
Publisher: Elsevier Science & Technology Books
Binding: Hardcover
Pages: 480
Size: 6.25" wide x 9.50" long x 1.50" tall
Weight: 2.090
Language: English

Preface to the Third Edition
Preface to the Second Edition
Acknowledgments
Essentials of Computer Securityp. 3
Computer Crime and the Lawp. 29
Organizing for EDP Securityp. 65
Protection of Informationp. 79
Screening and Management of Personnelp. 99
Physical Access Controlp. 115
Physical Securityp. 131
Environmental Securityp. 145
Disaster Controlp. 157
Line Securityp. 177
Transmission Securityp. 199
Cryptographic Securityp. 215
Emanations Securityp. 251
Technical Securityp. 267
Systems Identificationp. 281
Isolation in Computer Systemsp. 307
Systems Access Controlp. 329
Detection and Surveillancep. 353
Systems Integrityp. 369
Systems Reliability and Securityp. 389
Security and Personal Computersp. 403
Systems Approach to Risk Managementp. 459
Threat Assessmentp. 477
Assets and Safeguardsp. 491
Keeping Secrets in Computersp. 505
Modes of Risk Analysisp. 547
References for Part VIp. 569
Appendix: Sample Log Formsp. 575
Glossaryp. 579
Selected Bibliographyp. 629
Indexp. 635
Table of Contents provided by Blackwell. All Rights Reserved.