Computer security reference book
Author(s)
Bibliographic Information
Computer security reference book
Butterworth-Heinemann, 1992
Available at / 2 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This comprehensive reference book provides an in-depth treatment of the whole field including computer crime; data protection; EFTPOS schemes; evaluation of security products; hacking; public key cryptography; risk analysis; telecommunications; unix and security; viruses; as well as many other important and topical aspects of computer security.
Table of Contents
- Introduction
- access control
- auditing
- automatic teller machines (ATMs)
- backup procedures (personal computers)
- backup procedures (large computers)
- computer crime
- computer security in banking
- contingency planning
- cryptography
- data protection
- distributed systems
- EFTPOS schemes
- electromagnetic radiation
- encryption algorithms
- environmental security
- evaluation of security products
- fail-safe computing
- fibre optics
- formal methods
- hacking
- history of computer security
- identity verification
- intelligent tokens
- key management
- legal aspects of computer security
- large computers
- MS-DOS - a non-secure operating system
- multi-level security and trusted systems
- networks
- personal computers
- physical security
- public key cryptography
- risk analysis
- security consultants - how to choose them
- software methods
- security in software or hardware form?
- standards
- surveillance
- telecommunications
- unix and security
- viruses.
by "Nielsen BookData"