TY - BOOK AU - Gallery,Shari Mendelson TI - Computer security: readings from Security management magazine SN - 0409900842 (pbk.) AV - QA76.9.A25 C655 1987 U1 - 005.8 19 PY - 1987/// CY - Boston PB - Butterworths KW - Computer security KW - Electronic data processing departments KW - Security measures N1 - Includes bibliographies and index; Why haven't you done something about EDP security / Roger D. Wilson and Martin E. Silverman -- Before disaster strikes, fortify your computer / Henry M. Kluepfel -- Computer security belongs in the security department / Henry J. Beattie -- Are you computer wise / Frederick G. Tompkins -- The gap between computer people and security people / Dennis F. Poindexter -- Automated information systems: the same rules don't apply / James A. Schweitzer -- Judging your computer liability / Robert F. Johnson -- Put information assets on the balance sheet / Dr. Alan G. Merten, Patrice Delancy, Beth Poomerantz, and Paula Kelly -- The basics of EDP risk assessment / James R. Wade -- Computing security risk analysis: is it worth it / James A. Schweitzer -- The hidden risk in risk analysis / Howard R. Keough -- Selective protection / Frank T. Roedell -- Information security strategy / Donald J. Coppotelli -- Effictively securing business communications / James A. Schweitzer -- Protecting information outside the office / M. L. Proctor -- Don't forget to debrief / M. L. Proctor -- Data security--key to protecting your store's assets / Charles Jackson; Who are the computer criminals / Jay Becker -- Computer abuse research update / Donn B. Parker -- Some basic bytes on keeping computer security thieves out of your system / Arion N. Pattakos -- Insurance against a data disaster / Bernard Balter -- Quick, efficient recovery of the DP function: a critical security responsibility / Michael Sobol -- How changes in computing practices affect security / James S. Schweitzer -- Will computer security keep pace / Carl R. Armstrong -- Remote controls for computer data: data processing firms offer security packages / Mary Alice Crawford -- Computational cryptography is an EDP security aid / William E. Perry and Herbert S. Bright -- Seven fallacies confuse computer fire safety / Robert V. Jacobson; Security in the trenches / Charles H. Norris, jr. -- Scanning the site for computer installations / Richard H. Bessenhoffer -- Controlling physical access from a central location / Brian B. Austin -- What's new in computer security accessories / Sandy Evans -- Destruction of input and output materials / Megan Jaegerman -- Conservation and the destruction of classified waste material / Gerald A. Straccia -- How to select and implement a data security product / Robert E. Johnson -- A technical approach to computer access control / Eugene F. Troy, Stuart W. Katzke, and Dennis D. Steinauer -- A model for screening computer users / Charles Goodroe -- The role of the questioned document examiner in computer crime investigations / Dr. David A. Crown UR - http://www.archive.org/details/computersecurity00gall UR - http://www.openlibrary.org/books/OL2725140M ER -