|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn898771671 |
003 |
OCoLC |
005 |
20231117033003.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
141227s1987 maua ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d N$T
|d OCLCQ
|d N$T
|d OCLCE
|d OKU
|d OCLCF
|d OPELS
|d IDEBK
|d E7B
|d DEBSZ
|d OCLCQ
|d YDXCP
|d OCLCQ
|d MERUC
|d OCLCA
|d OCLCQ
|d VLY
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 570626192
|a 609328958
|a 1162098757
|
020 |
|
|
|a 9781483103013
|q (electronic bk.)
|
020 |
|
|
|a 1483103013
|q (electronic bk.)
|
020 |
|
|
|z 9780409900323
|
020 |
|
|
|z 040990032X
|
035 |
|
|
|a (OCoLC)898771671
|z (OCoLC)570626192
|z (OCoLC)609328958
|z (OCoLC)1162098757
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a HF5548.2
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/78
|2 19
|
100 |
1 |
|
|a Carroll, John M.
|q (John Millar),
|d 1925-2011.
|
245 |
1 |
0 |
|a Computer security /
|c John M. Carroll.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Boston :
|b Butterworths,
|c �1987.
|
300 |
|
|
|a 1 online resource (xv, 446 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references (pages 431-436) and index.
|
505 |
0 |
|
|a Front Cover; Computer Security; Copyright Page; Dedication; Table of Contents; Acknowledgments; Introduction; PART I: The Threat to Computer Security; Chapter 1. Essentials of Computer Security; UNIQUE EDP SECURITY PROBLEMS; EDP SECURITY IN A NUTSHELL; Chapter 2. A Casebook of Computer Crime; CASE HISTORIES; CONCLUSION; PART II: Security Management Considerations; Chapter 3. Organizing for EDP Security; EDP SECURITY IN THE PUBLIC SECTOR; EDP SECURITY IN THE PRIVATE SECTOR; CORPORATE EDP SECURITY; DUTIES OF THE SECURITY COORDINATOR; PRINCIPLES OF SECURITY MANAGEMENT.
|
505 |
8 |
|
|a Chapter 4. Protection of InformationCLASSIFICATION-THE GOVERNMENT MODEL; CLASSIFICATION-THE CORPORATE MODEL; SPECIAL PROBLEMS WITH EDP; MARKING CLASSIFIED MATTER; STORING CLASSIFIED MATTER; DESTROYING CLASSIFIED MATTER; RESIDUAL MEMORY IN MAGNETIC MEDIA; PROCEDURAL SAFEGUARDS FOR CLASSIFIED MATTER; CONCLUSION; Chapter 5. Screening and Management of Personnel; MANAGEMENT RESPONSIBILITY; RELATIONS WITH VENDORS; CATEGORIES OF SECURITY CLEARANCE; SECURITY SCREENING OF EMPLOYEES; PERSONNEL SECURITY POLICIES; CONCLUSION; PART III: Physical Security; Chapter 6. Physical Access Control.
|
505 |
8 |
|
|a BASICS OF ACCESS CONTROLAUTOMATIC ACCESS CONTROL; KEY ACCESS CONTROL; CONCENTRIC CONTROLLED PERIMETERS; OUTER PERIMETER ACCESS; BUILDING ACCESS CONTROL; CONTROL OF ACCESS TO RESTRICTED AREAS; MATERIAL CONTROL IN RESTRICTED AREAS; COMPUTER ROOM ACCESS CONTROL; Chapter 7. Physical Security; THE FORTRESS CONCEPT; OUTER PERIMETER DEFENSE; BUILDING PERIMETERS; RESTRICTED AREA PERIMETER; COMPUTER ROOM SECURITY; Chapter 8. Environmental Security; ELECTRICAL POWER; GROUNDING; INTERFERENCE SUPPRESSION; DUST CONTROL; ENVIRONMENTAL CONTROLS; Chapter 9. Disaster Control; LOCATING THE COMPUTER CENTER.
|
505 |
8 |
|
|a PROTECTING THE COMPUTER CENTERAUTOMATIC FIRE DETECTION; GENERAL FIRE-SAFETY PLANNING; DISASTER RECOVERY; PART IV: Communications Security; Chapter 10. Line Security; COMMUNICATIONS SECURITY SUBFIELDS; DEFINITION OF TERMINAL; SECURITY OF COMMUNICATIONS CABLES; INTERIOR COMMUNICATIONS LINES; TELEPHONE INSTRUMENT SECURITY; ADDITIONAL LINE SECURITY CONSIDERATIONS; LOCAL AREA NETWORKS; SPACE RADIO INTERCEPTION; Chapter 11. Transmission Security; GENERAL CONSIDERATIONS; OPERATING PROCEDURES; SPEECH PRIVACY; ERROR-PROOF CODES; TRAFFIC ANALYSIS; Chapter 12. Cryptographic Security.
|
505 |
8 |
|
|a INTRODUCTION TO CRYPTOLOGYOVERVIEW OF CYPHERS; HOW CYPHERS WORK; HOW DES WORKS; NETWORK COMMUNICATIONS SECURITY; WEAKNESSES OF DES; WAYS TO USE DES; ASYMMETRICAL CYPHERS; CRYPTO PROCEDURES; CRYPTANALYSIS; SUMMARY; Chapter 13. Emission Security; EMISSION PROBLEMS; PROBABILITY OF INTERCEPTION; DEFENSE MECHANISMS; MEASURING ELECTROMAGNETIC EMANATION LEVELS; ADDITIONAL DEFENSES; DEFENSE AGAINST ACOUSTICAL EMANATIONS; Chapter 14. Technical Security; VICTIMIZATION OF EDP CENTERS; CATEGORIES OF TECHNICAL SURVEILLANCE; DEFENSES AGAINST TECHNICAL SURVEILLANCE; TYPES OF INTRUSION DEVICES.
|
500 |
|
|
|a PART V: Systems Security.
|
520 |
|
|
|a Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Electronic data processing departments
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a Centres de traitement de l'information
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0315254
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Criminalit�e informatique.
|0 (CaQQLa)201-0056438
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|2 fast
|0 (OCoLC)fst00872063
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Electronic data processing departments
|x Security measures
|2 fast
|0 (OCoLC)fst00907090
|
776 |
0 |
8 |
|i Print version:
|a Carroll, John M. (John Millar), 1925-
|t Computer security.
|b 2nd ed.
|d Boston : Butterworths, �1987
|z 040990032X
|w (DLC) 86029901
|w (OCoLC)14716382
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780409900323
|z Texto completo
|