Cargando…

Computer security /

Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Carroll, John M. (John Millar), 1925-2011
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Butterworths, �1987.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn898771671
003 OCoLC
005 20231117033003.0
006 m o d
007 cr cnu---unuuu
008 141227s1987 maua ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d N$T  |d OCLCQ  |d N$T  |d OCLCE  |d OKU  |d OCLCF  |d OPELS  |d IDEBK  |d E7B  |d DEBSZ  |d OCLCQ  |d YDXCP  |d OCLCQ  |d MERUC  |d OCLCA  |d OCLCQ  |d VLY  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 570626192  |a 609328958  |a 1162098757 
020 |a 9781483103013  |q (electronic bk.) 
020 |a 1483103013  |q (electronic bk.) 
020 |z 9780409900323 
020 |z 040990032X 
035 |a (OCoLC)898771671  |z (OCoLC)570626192  |z (OCoLC)609328958  |z (OCoLC)1162098757 
042 |a dlr 
050 4 |a HF5548.2 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 19 
100 1 |a Carroll, John M.  |q (John Millar),  |d 1925-2011. 
245 1 0 |a Computer security /  |c John M. Carroll. 
250 |a 2nd ed. 
260 |a Boston :  |b Butterworths,  |c �1987. 
300 |a 1 online resource (xv, 446 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
588 0 |a Print version record. 
504 |a Includes bibliographical references (pages 431-436) and index. 
505 0 |a Front Cover; Computer Security; Copyright Page; Dedication; Table of Contents; Acknowledgments; Introduction; PART I: The Threat to Computer Security; Chapter 1. Essentials of Computer Security; UNIQUE EDP SECURITY PROBLEMS; EDP SECURITY IN A NUTSHELL; Chapter 2. A Casebook of Computer Crime; CASE HISTORIES; CONCLUSION; PART II: Security Management Considerations; Chapter 3. Organizing for EDP Security; EDP SECURITY IN THE PUBLIC SECTOR; EDP SECURITY IN THE PRIVATE SECTOR; CORPORATE EDP SECURITY; DUTIES OF THE SECURITY COORDINATOR; PRINCIPLES OF SECURITY MANAGEMENT. 
505 8 |a Chapter 4. Protection of InformationCLASSIFICATION-THE GOVERNMENT MODEL; CLASSIFICATION-THE CORPORATE MODEL; SPECIAL PROBLEMS WITH EDP; MARKING CLASSIFIED MATTER; STORING CLASSIFIED MATTER; DESTROYING CLASSIFIED MATTER; RESIDUAL MEMORY IN MAGNETIC MEDIA; PROCEDURAL SAFEGUARDS FOR CLASSIFIED MATTER; CONCLUSION; Chapter 5. Screening and Management of Personnel; MANAGEMENT RESPONSIBILITY; RELATIONS WITH VENDORS; CATEGORIES OF SECURITY CLEARANCE; SECURITY SCREENING OF EMPLOYEES; PERSONNEL SECURITY POLICIES; CONCLUSION; PART III: Physical Security; Chapter 6. Physical Access Control. 
505 8 |a BASICS OF ACCESS CONTROLAUTOMATIC ACCESS CONTROL; KEY ACCESS CONTROL; CONCENTRIC CONTROLLED PERIMETERS; OUTER PERIMETER ACCESS; BUILDING ACCESS CONTROL; CONTROL OF ACCESS TO RESTRICTED AREAS; MATERIAL CONTROL IN RESTRICTED AREAS; COMPUTER ROOM ACCESS CONTROL; Chapter 7. Physical Security; THE FORTRESS CONCEPT; OUTER PERIMETER DEFENSE; BUILDING PERIMETERS; RESTRICTED AREA PERIMETER; COMPUTER ROOM SECURITY; Chapter 8. Environmental Security; ELECTRICAL POWER; GROUNDING; INTERFERENCE SUPPRESSION; DUST CONTROL; ENVIRONMENTAL CONTROLS; Chapter 9. Disaster Control; LOCATING THE COMPUTER CENTER. 
505 8 |a PROTECTING THE COMPUTER CENTERAUTOMATIC FIRE DETECTION; GENERAL FIRE-SAFETY PLANNING; DISASTER RECOVERY; PART IV: Communications Security; Chapter 10. Line Security; COMMUNICATIONS SECURITY SUBFIELDS; DEFINITION OF TERMINAL; SECURITY OF COMMUNICATIONS CABLES; INTERIOR COMMUNICATIONS LINES; TELEPHONE INSTRUMENT SECURITY; ADDITIONAL LINE SECURITY CONSIDERATIONS; LOCAL AREA NETWORKS; SPACE RADIO INTERCEPTION; Chapter 11. Transmission Security; GENERAL CONSIDERATIONS; OPERATING PROCEDURES; SPEECH PRIVACY; ERROR-PROOF CODES; TRAFFIC ANALYSIS; Chapter 12. Cryptographic Security. 
505 8 |a INTRODUCTION TO CRYPTOLOGYOVERVIEW OF CYPHERS; HOW CYPHERS WORK; HOW DES WORKS; NETWORK COMMUNICATIONS SECURITY; WEAKNESSES OF DES; WAYS TO USE DES; ASYMMETRICAL CYPHERS; CRYPTO PROCEDURES; CRYPTANALYSIS; SUMMARY; Chapter 13. Emission Security; EMISSION PROBLEMS; PROBABILITY OF INTERCEPTION; DEFENSE MECHANISMS; MEASURING ELECTROMAGNETIC EMANATION LEVELS; ADDITIONAL DEFENSES; DEFENSE AGAINST ACOUSTICAL EMANATIONS; Chapter 14. Technical Security; VICTIMIZATION OF EDP CENTERS; CATEGORIES OF TECHNICAL SURVEILLANCE; DEFENSES AGAINST TECHNICAL SURVEILLANCE; TYPES OF INTRUSION DEVICES. 
500 |a PART V: Systems Security. 
520 |a Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers. 
546 |a English. 
650 0 |a Electronic data processing departments  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a Centres de traitement de l'information  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0315254 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Criminalit�e informatique.  |0 (CaQQLa)201-0056438 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Computer crimes  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Electronic data processing departments  |x Security measures  |2 fast  |0 (OCoLC)fst00907090 
776 0 8 |i Print version:  |a Carroll, John M. (John Millar), 1925-  |t Computer security.  |b 2nd ed.  |d Boston : Butterworths, �1987  |z 040990032X  |w (DLC) 86029901  |w (OCoLC)14716382 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780409900323  |z Texto completo