BIBLIOTECA Y CENTRO DE DOCUMENTACIÓN
Vista normal Vista MARC Vista ISBD

Computer security handbook /

por Hutt, Arthur E [ed.]; Bosworth, Seymour [ed.]; Hoyt, Douglas B [ed.].
Tipo: materialTypeLabelLibroEditor: New York : John Wiley & Sons, Inc., c1995Edición: 3a ed.Descripción: [600] p. ; 26 cm.ISBN: 0471118540.Tema(s): RED INFORMATICA | TECNOLOGIA DE LA COMUNICACION | TECNOLOGIA DE LA INFORMACION | INTERFAZ DE ORDENADORES | SISTEMA INFORMATICO | PROTECCION DE DATOS
Contenidos:
Part one: management's responsibility
1. Management's role in computer security / Arthur E. Hutt.
2. Policies, standards and procedures / Noel K. Zakin.
3. Information security risk management / John M. Carroll.
4. Employment policies and practices / Robert W. London.
5. Legal issues in computer security / Robert P. Bigelow.
6. Computer crime and computer criminals / G. Jach Bologna.
Part Two: Basic safeguards
7. Contingency planning and disaster recovery / Arthur E. Hutt.
8. Computer risks and insurance / Johnson ; Hggins
9. Auditing computer security / Diane E. Levine.
10. System application controls / Timothy Braithwaire.
Part three: Physical protection
11. Hardware elements of security / Seymour Bosworth.
12. Computer facility protection / Franklin n. Platt
13. Monitoring and related control devices / Eugene V. Redmond.
Part Four: technical protection /
14. Software and information security / Myles E. Walsh.
15. Security of computer data, records, and forms / Douglas B. Hoyt.
16. Data Encryption Diane E. Levine.
17. Data communications and networking / Seymour Bosworth.
18. Penetrating computer systems and networking / M. E. Kabay.
19. Viruses and related threats to computer security / Diane E. Levine.
Part five : special protection issues /
20. Outside services / Jack M. Durner.
21. Security for personal computers / Jon R. David.
22. Local area network security / Diane E. Levine.
23. Security on the Internet / Robert Gezelter.
Appendixes
A1. Central management of distributed systems
A2. Guide for selecting automated risk analysis tools / Irene E. Gilbert.
A3. Security standards manual: table of contents (sample)
A4. Confidentiality agreement (sample)
A5. Admissibility of computer records
A6. Revenue procedure 91-59: IRS guidelines for ADP records
A7. IRS revenue ruling 71-20: what are records?
A8. Confidential and proprietary information agreement (sample)
A9. The hot-side solution: how would you maintain critical operations if disaster struck your site? / Daniel Kilburn.
A 10. Employee nondisclusere agreement (sample)
A 11. Computer privacy in teh United States / Robert P. Bigelow.
A 12. Selected bibliography on computer crime /
A 13. Off-site record storage considerations
A 14. Federal Information processing standards: abstracts
A 14 (a). FIPS PUB 46-2: Data encryption standard
A 14 (b). FIPS PUB 180: Secure Hash standard
A 15. EDP auditing and related packages / Diane E. Levine.
A 15 (a). PC self-assessment / Ernst ; Young.
A 16. LAN security products / Diane E. Levine.
A 17. Model framework for managemetn control over automated information systems (excerpts)
A 18. FFIEC EDP Examination work program
A 19. FFIEC Examination policies
A 20. Minimum security funtionality requirements for multiuser operation systems
A 21. Automated tools for testing computer systems vulnerability / W. Timothy Polk.
A 22. Virus notes and products / Diane E. Levine.
A 23. Threat assessment of malicious code and human threats / Lawrence E. Bassham ; W. Timothy Polk.
A 24. Internet security and risk reduction /
A 25. UPS Systems: technical notes
A 26. Data encryption products / Diane E. Levine.
A 27. Remote access computing / Tommy Ward.
A 28. Firewall protection on the Internet
A 29. End-user computing.
Etiquetas de esta biblioteca:
No hay etiquetas de esta biblioteca para este título.
Ingresar para agregar etiquetas.
    valoración media: 0.0 (0 votos)
Tipo de ítem Ubicación Signatura topográfica Copia Estado Fecha de vencimiento
Libros Libros
Colección general

Colección General de la BibliotecaUNM

005.8 COMP 736 (Navegar estantería) Ej. C Disponible

Incluye referencia bibliográfica e índice.

Part one: management's responsibility

1. Management's role in computer security / Arthur E. Hutt.

2. Policies, standards and procedures / Noel K. Zakin.

3. Information security risk management / John M. Carroll.

4. Employment policies and practices / Robert W. London.

5. Legal issues in computer security / Robert P. Bigelow.

6. Computer crime and computer criminals / G. Jach Bologna.

Part Two: Basic safeguards

7. Contingency planning and disaster recovery / Arthur E. Hutt.

8. Computer risks and insurance / Johnson ; Hggins

9. Auditing computer security / Diane E. Levine.

10. System application controls / Timothy Braithwaire.

Part three: Physical protection

11. Hardware elements of security / Seymour Bosworth.

12. Computer facility protection / Franklin n. Platt

13. Monitoring and related control devices / Eugene V. Redmond.

Part Four: technical protection /

14. Software and information security / Myles E. Walsh.

15. Security of computer data, records, and forms / Douglas B. Hoyt.

16. Data Encryption Diane E. Levine.

17. Data communications and networking / Seymour Bosworth.

18. Penetrating computer systems and networking / M. E. Kabay.

19. Viruses and related threats to computer security / Diane E. Levine.

Part five : special protection issues /

20. Outside services / Jack M. Durner.

21. Security for personal computers / Jon R. David.

22. Local area network security / Diane E. Levine.

23. Security on the Internet / Robert Gezelter.

Appendixes

A1. Central management of distributed systems

A2. Guide for selecting automated risk analysis tools / Irene E. Gilbert.

A3. Security standards manual: table of contents (sample)

A4. Confidentiality agreement (sample)

A5. Admissibility of computer records

A6. Revenue procedure 91-59: IRS guidelines for ADP records

A7. IRS revenue ruling 71-20: what are records?

A8. Confidential and proprietary information agreement (sample)

A9. The hot-side solution: how would you maintain critical operations if disaster struck your site? / Daniel Kilburn.

A 10. Employee nondisclusere agreement (sample)

A 11. Computer privacy in teh United States / Robert P. Bigelow.

A 12. Selected bibliography on computer crime /

A 13. Off-site record storage considerations

A 14. Federal Information processing standards: abstracts

A 14 (a). FIPS PUB 46-2: Data encryption standard

A 14 (b). FIPS PUB 180: Secure Hash standard

A 15. EDP auditing and related packages / Diane E. Levine.

A 15 (a). PC self-assessment / Ernst ; Young.

A 16. LAN security products / Diane E. Levine.

A 17. Model framework for managemetn control over automated information systems (excerpts)

A 18. FFIEC EDP Examination work program

A 19. FFIEC Examination policies

A 20. Minimum security funtionality requirements for multiuser operation systems

A 21. Automated tools for testing computer systems vulnerability / W. Timothy Polk.

A 22. Virus notes and products / Diane E. Levine.

A 23. Threat assessment of malicious code and human threats / Lawrence E. Bassham ; W. Timothy Polk.

A 24. Internet security and risk reduction /

A 25. UPS Systems: technical notes

A 26. Data encryption products / Diane E. Levine.

A 27. Remote access computing / Tommy Ward.

A 28. Firewall protection on the Internet

A 29. End-user computing.

No hay comentarios para este ítem.

Ingresar a su cuenta para colocar un comentario.

Haga clic en la imagen para verla en el visor de imágenes

Buscar para este título en:

Biblioteca UNM
Universidad Nacional de Moreno
Av. Bme. Mitre Nº 1891 (B1744OHC) Moreno
Provincia de Buenos Aires, República Argentina
(0237) 460-9300 (líneas rotativas)
(011) 2078-9170 (líneas rotativas)
biblioteca@unm.edu.ar
Universidad del Bicentenario Argentino