Advances in Computer Security Management


Book Description

Summarizes the current status of the computer security field. Discusses the history and legal interpretations of security management and details the steps involved in one method of completing risk assessment. Provides coverage of the location and design of a computer facility and explains how to recover when disaster destroys computer operations and/or records. Compares control table methods against cryptography. Examines future developments in data processing and the consideration of liability, standards of accreditation, authentication, internal auditing, personnel, and contingency planning.







Proceedings, 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7-9, 1990, Oakland, California


Book Description

Proceedings of the 1990 IEEE Computer Society Symposium on [title], held in Oakland, Calif., May 1990. The sessions are devoted to secure systems, databases, information flow, access control and integrity, authentication, auditing and intrusion detection, verification, and challenges of the 1990s. No subject index. Annotation copyrighted by Book News, Inc., Portland, OR.










Dimensions


Book Description







Foiling the System Breakers


Book Description