Commonsense Computer Security : Your Practical Guide to Information Protection / Martin Smith.
Material type: TextSeries: The IBM McGraw-Hill seriesPublication details: London ; New York : McGraw-Hill Book Co., c1993.Edition: 2nd edDescription: xv, 280 p. : ill. ; 26 cmISBN:- 0077078055 :
- QA76.9.A25 S64 1993
Item type | Current library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|
Books | Library First Floor | QA76.9.A25 S64 1993 (Browse shelf(Opens below)) | 1 | Available | 2427 |
Browsing Library shelves, Shelving location: First Floor Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
QA76.9.A25 P43 2012 Analyzing computer security : a threat/vulnerability/countermeasure approach / | QA76.9.A25 .P64 2019 Navigating new cyber risks: how businesses can plan, build and manage safe spaces in the digital age / | QA76.9.A25 .P67 2022 Python for Cybersecurity : using python for cyber offense and defense / | QA76.9.A25 S64 1993 Commonsense Computer Security : Your Practical Guide to Information Protection / | QA76.9.A25 S653 2005 Trusted Computing Platforms : design and applications / | QA76.9.A25 .V54 2022 IT security controls: a guide to corporate standards and framewrks / | QA76.9 A3382 2008 تصميم الدوائر المنطقي: الإلكترونات الرقمية/ |
Includes bibliographical references (p. 275-276) and index.
Part 1 The nature of the problem: the nature of computer security; threats and vulnerabilities; assessing the risks; countering the dangers; valuing data; developing a computer security policy. Part 2 Responsibilities for computer security: computer versus security staff?; allocation of computer security duties; registration of computers. Part 3 The countermeasures: physical security; document security; personnel security; hardware security; software security and logical access control; evaluation, certification and accreditation; compromising emanations (TEMPEST); communications and network security; business continuity planning and disaster recovery; computer insurance; security of personal computers; computer viruses; training and awareness. Part 4 Crime and legislation: computer crime; computer security and the law.
Explains in practical, jargon-free terms how an organization can cost-effectively reduce the risk to information stored, processed and transmitted by their computer systems. This new edition discusses the latest developments in the field and includes coverage of legislation and computer crime.
There are no comments on this title.