Computer Virus Prevalence Survey, (1996)


Book Description

Identifies the nature and extent of the computer virus problem in PC-type computers and networks. The survey's scope includes: Intel-based computers (Apple Macintosh computers were not included); North American sites only; and industrial and government business sectors (home and educational sites were excluded). The telephone survey was conducted with 300 end-users which were randomly selected from a list of sites with 500 or more PCs at that site. The sample includes all service and industry SIC codes, as well as Federal, state, and local government.




Maximum Security


Book Description

For programmers, system administrators, managers, security specialists--anyone interested in learning about weaknesses in Internet and computer system security and the ways to correct them--the revised and updated edition of this book discusses hundreds of computer "holes" and covers the latest techniques that hackers are using to crack computers and networks.




Integrity and Internal Control in Information Systems


Book Description

Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is the status quo of research and development in this area? Where are the gaps between business needs on the one hand and research/development on the other; what needs to be done to bridge these gaps? Integrity and Internal Control in Information Systems contains the selected proceedings of the Second Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Warrenton, Virginia, USA, in November 1998. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and edp-auditing.




Windows Magazine


Book Description




Toward a Safer and More Secure Cyberspace


Book Description

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation's critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.




Electronic America


Book Description










The Practical Handbook of Internet Computing


Book Description

The Practical Handbook of Internet Computing analyzes a broad array of technologies and concerns related to the Internet, including corporate intranets. Fresh and insightful articles by recognized experts address the key challenges facing Internet users, designers, integrators, and policymakers. In addition to discussing major applications, it also




Malicious Mobile Code


Book Description

Viruses today are more prevalent than ever and the need to protect the network or company against attacks is imperative. Grimes gives strategies, tips and tricks needed to secure any system. He explains what viruses can and can't do, and how to recognize, remove and prevent them.