Cover image for The international handbook of computer security
Title:
The international handbook of computer security
Author:
Shim, Jae K.
Publication Information:
Chicago : Glenlake Pub. Co., Ltd. ; New York : AMACOM, [2000]

©2000
Physical Description:
xi, 260 pages : illustrations ; 24 cm
Language:
English
ISBN:
9780814405796
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Central Library QA76.9.A25 I58 2000 Adult Non-Fiction Central Closed Stacks
Searching...

On Order

Summary

Summary

This book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures -- data preservation and protection -- hardware and software protection -- personnel management and security -- network security -- contingency planning -- legal and auditing planning and control and more.


Author Notes

Jae K. Shim, Ph.D., is professor of business administration at California State University, Long Beach
Anique Qureshi, Ph.D., CPA, CIA, is associate professor of accounting and information systems at Queens College of the City University of New York
Joel G. Siegel, Ph.D., CPA, is a consultant and professor of accounting, finance, and information systems, Queens College of the City University of New York


Table of Contents

About the Authorsp. ix
What This Book Will do For Youp. xi
Chapter 1 Organizational Policyp. 1
Chapter 2 Physical Security and Data Preservationp. 11
Chapter 3 Hardware Securityp. 33
Chapter 4 Software Securityp. 67
Chapter 5 Personnel Securityp. 109
Chapter 6 Network Securityp. 117
Appendix 6.A Commercial Firewallsp. 145
Appendix 6.B Firewall Resellersp. 153
Appendix 6.C Public Domain, Shareware, etc.p. 163
Chapter 7 Security Policyp. 165
Appendix 7.A Sources of Information Security Policiesp. 178
Appendix 7.B Sample Computer Policyp. 179
Chapter 8 Contingency Planningp. 191
Appendix 8.A Business Impact Analysis Worksheetp. 213
Appendix 8.B Communications Assessment Questionnairep. 215
Appendix 8.C Insurance Recovery Programp. 217
Appendix 8.D Making an Insurance Claimp. 219
Chapter 9 Auditing and Legal Issuesp. 221
Appendix Security Softwarep. 235
Indexp. 241

Google Preview