Amazon cover image
Image from Amazon.com
Image from Coce

Computer security : [electronic resource] readings from Security management magazine / edited by Shari Mendelson Gallery.

Contributor(s): Material type: TextTextPublication details: Boston : Butterworths, c1987.Description: xvi, 301 p. : ill. ; 24 cmISBN:
  • 0409900842 (pbk.)
  • 9780409900842 (pbk.)
Uniform titles:
  • Security management (Arlington, Va.)
Subject(s): DDC classification:
  • 005.8 19
LOC classification:
  • QA76.9.A25 C655 1987
Online resources:
Contents:
Why haven't you done something about EDP security / Roger D. Wilson and Martin E. Silverman -- Before disaster strikes, fortify your computer / Henry M. Kluepfel -- Computer security belongs in the security department / Henry J. Beattie -- Are you computer wise / Frederick G. Tompkins -- The gap between computer people and security people / Dennis F. Poindexter -- Automated information systems: the same rules don't apply / James A. Schweitzer -- Judging your computer liability / Robert F. Johnson -- Put information assets on the balance sheet / Dr. Alan G. Merten, Patrice Delancy, Beth Poomerantz, and Paula Kelly -- The basics of EDP risk assessment / James R. Wade -- Computing security risk analysis: is it worth it / James A. Schweitzer -- The hidden risk in risk analysis / Howard R. Keough -- Selective protection / Frank T. Roedell -- Information security strategy / Donald J. Coppotelli -- Effictively securing business communications / James A. Schweitzer -- Protecting information outside the office / M. L. Proctor -- Don't forget to debrief / M. L. Proctor -- Data security--key to protecting your store's assets / Charles Jackson.
Who are the computer criminals / Jay Becker -- Computer abuse research update / Donn B. Parker -- Some basic bytes on keeping computer security thieves out of your system / Arion N. Pattakos -- Insurance against a data disaster / Bernard Balter -- Quick, efficient recovery of the DP function: a critical security responsibility / Michael Sobol -- How changes in computing practices affect security / James S. Schweitzer -- Will computer security keep pace / Carl R. Armstrong -- Remote controls for computer data: data processing firms offer security packages / Mary Alice Crawford -- Computational cryptography is an EDP security aid / William E. Perry and Herbert S. Bright -- Seven fallacies confuse computer fire safety / Robert V. Jacobson.
Security in the trenches / Charles H. Norris, jr. -- Scanning the site for computer installations / Richard H. Bessenhoffer -- Controlling physical access from a central location / Brian B. Austin -- What's new in computer security accessories / Sandy Evans -- Destruction of input and output materials / Megan Jaegerman -- Conservation and the destruction of classified waste material / Gerald A. Straccia -- How to select and implement a data security product / Robert E. Johnson -- A technical approach to computer access control / Eugene F. Troy, Stuart W. Katzke, and Dennis D. Steinauer -- A model for screening computer users / Charles Goodroe -- The role of the questioned document examiner in computer crime investigations / Dr. David A. Crown.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Status Date due Barcode
EBooks EBooks Main Library-Nabua Project Gutenberg QA76.9.A25 C655 1987 (Browse shelf(Opens below)) Available

Includes bibliographies and index.

Why haven't you done something about EDP security / Roger D. Wilson and Martin E. Silverman -- Before disaster strikes, fortify your computer / Henry M. Kluepfel -- Computer security belongs in the security department / Henry J. Beattie -- Are you computer wise / Frederick G. Tompkins -- The gap between computer people and security people / Dennis F. Poindexter -- Automated information systems: the same rules don't apply / James A. Schweitzer -- Judging your computer liability / Robert F. Johnson -- Put information assets on the balance sheet / Dr. Alan G. Merten, Patrice Delancy, Beth Poomerantz, and Paula Kelly -- The basics of EDP risk assessment / James R. Wade -- Computing security risk analysis: is it worth it / James A. Schweitzer -- The hidden risk in risk analysis / Howard R. Keough -- Selective protection / Frank T. Roedell -- Information security strategy / Donald J. Coppotelli -- Effictively securing business communications / James A. Schweitzer -- Protecting information outside the office / M. L. Proctor -- Don't forget to debrief / M. L. Proctor -- Data security--key to protecting your store's assets / Charles Jackson.

Who are the computer criminals / Jay Becker -- Computer abuse research update / Donn B. Parker -- Some basic bytes on keeping computer security thieves out of your system / Arion N. Pattakos -- Insurance against a data disaster / Bernard Balter -- Quick, efficient recovery of the DP function: a critical security responsibility / Michael Sobol -- How changes in computing practices affect security / James S. Schweitzer -- Will computer security keep pace / Carl R. Armstrong -- Remote controls for computer data: data processing firms offer security packages / Mary Alice Crawford -- Computational cryptography is an EDP security aid / William E. Perry and Herbert S. Bright -- Seven fallacies confuse computer fire safety / Robert V. Jacobson.

Security in the trenches / Charles H. Norris, jr. -- Scanning the site for computer installations / Richard H. Bessenhoffer -- Controlling physical access from a central location / Brian B. Austin -- What's new in computer security accessories / Sandy Evans -- Destruction of input and output materials / Megan Jaegerman -- Conservation and the destruction of classified waste material / Gerald A. Straccia -- How to select and implement a data security product / Robert E. Johnson -- A technical approach to computer access control / Eugene F. Troy, Stuart W. Katzke, and Dennis D. Steinauer -- A model for screening computer users / Charles Goodroe -- The role of the questioned document examiner in computer crime investigations / Dr. David A. Crown.

There are no comments on this title.

to post a comment.