Summer Reading Sale
 
 

Recently Viewed clear list


Original Essays | June 20, 2014

Lisa Howorth: IMG So Many Books, So Many Writers



I'm not a bookseller, but I'm married to one, and Square Books is a family. And we all know about families and how hard it is to disassociate... Continue »

spacer

This item may be
out of stock.

Click on the button below to search for this title in other formats.


Check for Availability
Add to Wishlist

Computer Security Handbook

Computer Security Handbook Cover

 

Synopses & Reviews

Publisher Comments:

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company's computer system and its contents. The Computer Security Handbook provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. This Fourth Edition continues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions you can take to eliminate them.

The collected chapters are written by renowned industry professionals. Requiring minimal technical knowledge to understand, covered topics include: foundations of computer security, threats and vulnerabilities, prevention (technical defenses and human factors), detection, remediation, management's role, and other considerations such as using encryption internationally, anonymity and identity in cyberspace, and censorship.

Protect the information and networks that are vital to your organization with Computer Security Handbook, Fourth Edition.

Synopsis:

Computer professionals need to protect the information and networks that are vital to their organization. The Computer Security Handbookbook and CD-ROM Set provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. This Fifth Editioncontinues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions that can be taken to eliminate them. The collected chapters are written by renowned industry professionals. Professionals in computer security will benefit from this book.

Synopsis:

Computer Security Handbook, Fourth Edition provides comprehensive coverage of the broad scope of issues relating to computer security in a well-organized, easy-to-follow format. By following the practices and procedures described in this handbook, accountants can minimize the possibilities of losses due to computer fraud, other criminal activity, or human error. Coverage is provided for practitioners as well as managers with minimal technological knowledge.

About the Author

SEYMOUR BOSWORTH, CDP , is president of S. Bosworth & Associates, Plainview, New York, a management consulting firm active in computing applications for banking, commerce, and industry. Since 1972 Bosworth has been a contributing editor to all four editions of the Computer Security Handbook, and he has written many articles and lectured extensively about computer security and other technical and managerial subjects. He has been responsible for design and manufacture, system analysis, programming, and operations of both digital and analog computers.

M. E. KABAY, PhD, is Associate Professor of Computer Information Systems at Norwich University, where he is also director of the graduate program in Information Assurance. During his career, he has worked as an operating systems internals and database performance specialist for Hewlett-Packard, an operations manager at a large service bureau, and a consultant in operations, performance, and security.

Table of Contents

PART ONE: FOUNDATIONS OF COMPUTER SECURITY.

Brief History and Mission of Information System Security (S. Bosworth & R. Jacobson).

Cyberspace Law and Computer Forensics (R. Heverly & M. Wright).

Using a "Common Language" for Computer Security Incident Information (J. Howard & P. Meunier).

Studies and Surveys of Computer Crime (M. Kabay).

Toward a New Framework for Information Security (D. Parker).

PART TWO: THREATS AND VULNERABILITIES.

The Psychology of Computer Criminals (Q. Campbell & D. Kennedy).

Information Warfare (S. Bosworth).

Penetrating Computer Systems and Networks (C. Cobb, et al.).

Malicious Code (R. Thompson).

Mobile Code (R. Gezelter).

Denial of Service Attacks (D. Levine & G. Kessler).

The Legal Framework for Protecting Intellectual Property in the Field of Computing and Computer Software (W. Zucker & S. Nathan).

E-Commerce Vulnerabilities (A. Ghosh).

Physical Threats to the Information Infrastructure (F. Platt).

PART THREE: PREVENTION: TECHNICAL DEFENSES.

Protecting the Information Infrastructure (F. Platt).

Identification and Authentication (R. Sandhu).

Operating System Security (W. Stallings).

Local Area Networks (G. Kessler & N. Pritsky).

E-Commerce Safeguards (J. Ritter & M. Money).

Firewalls and Proxy Servers (D. Brussin).

Protecting Internet-Visible Systems (R. Gezelter).

Protecting Web Sites (R. Gezelter).

Public Key Infrastructures and Certificate Authorities (S. Chokhani).

Antivirus Technology (C. Cobb).

Software Development and Quality Assurance (D. Levine).

Piracy and Antipiracy Techniques (D. Levine).

PART FOUR: PREVENTION: HUMAN FACTORS.

Standards for Security Products (P. Brusil & N. Zakin).

Security Policy Guidelines (M. Kabay).

Security Awareness (K. Rudolph, et al.).

Ethical Decision Making and High Technology (J. Linderman).

Employment Practices and Policies (M. Kabay).

Operations Security and Production Controls (M. Walsh & M. Kabay).

E-Mail and Internet Use Policies (M. Kabay).

Working with Law Enforcement (M. Wright).

Using Social Psychology to Implement Security Policies (M. Kabay).

Auditing Computer Security (D. Levine).

PART FIVE: DETECTION.

Vulnerability Assessment and Intrusion Detection Systems (R. Bace).

Monitoring and Control Systems (D. Levine).

Application Controls (M. Walsh).

PART SIX: REMEDIATION.

Computer Emergency Quick-Response Teams (B. Cowens & M. Miora).

Data Backups and Archives (M. Kabay).

Business Continuity Planning (M. Miora).

Disaster Recovery (M. Miora).

Insurance Relief (R. Parisi, Jr.).

PART SEVEN: MANAGEMENT'S ROLE.

Management Responsibilities and Liabilities (C. Hallberg, et al.).

Developing Security Policies (M. Kabay).

Risk Assessment and Risk Management (R. Jacobson).

Y2K: Lessons Learned for Computer Security (T. Braithwaite).

PART EIGHT: OTHER CONSIDERATIONS.

Medical Records Security (P. Brusil & D. Harley).

Using Encryption Internationally (D. Levine).

Censorship and Content Filtering (L. Tien & S. Finkelstein).

Privacy in Cyberspace (B. Hayes, et al.).

Anoymity and Identity in Cyberspace (M. Kabay).

The Future of Information Security (P. Tippett).

Index.

Product Details

ISBN:
9780471412588
Editor:
Bosworth, Seymour
Editor:
Kabay, M. E.
Editor:
Bosworth, Seymour
Editor:
Kabay, M. E.
Author:
Bosworth, Seymour
Author:
Whyne, Eric
Author:
Hoyt, Douglas B.
Author:
Kabay, M. E.
Author:
Kabay, Michel E.
Publisher:
Wiley
Location:
New York
Subject:
Information Management
Subject:
Networking - General
Subject:
Security
Subject:
Security measures
Subject:
Electronic data processing departments
Subject:
Security - General
Subject:
Systems & Planning
Subject:
IS security
Subject:
Seymour Bosworth
Subject:
M.E. Kabay
Subject:
computer hacking
Subject:
computer fraud
Subject:
malicious code
Subject:
Firewalls
Subject:
Disaster Recovery
Subject:
Cyberspace
Subject:
Encryption
Subject:
IT
Subject:
security awareness
Subject:
Networking/Security
Copyright:
Edition Number:
4
Edition Description:
Includes bibliographical references and index.
Series Volume:
1235SP
Publication Date:
March 2002
Binding:
Electronic book text in proprietary or open standard format
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Yes
Pages:
1224
Dimensions:
9.98x7.04x2.17 in. 4.47 lbs.

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Networking » Computer Security

Computer Security Handbook
0 stars - 0 reviews
$ In Stock
Product details 1224 pages John Wiley & Sons - English 9780471412588 Reviews:
"Synopsis" by , Computer professionals need to protect the information and networks that are vital to their organization. The Computer Security Handbookbook and CD-ROM Set provides a readable and comprehensive resource for protecting computer mainframe systems and PC networks. This Fifth Editioncontinues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions that can be taken to eliminate them. The collected chapters are written by renowned industry professionals. Professionals in computer security will benefit from this book.
"Synopsis" by , Computer Security Handbook, Fourth Edition provides comprehensive coverage of the broad scope of issues relating to computer security in a well-organized, easy-to-follow format. By following the practices and procedures described in this handbook, accountants can minimize the possibilities of losses due to computer fraud, other criminal activity, or human error. Coverage is provided for practitioners as well as managers with minimal technological knowledge.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.