Cover image for The international handbook of computer security
The international handbook of computer security
Shim, Jae K.
Publication Information:
Chicago : Glenlake Pub. Co., Ltd. ; New York : AMACOM, [2000]

Physical Description:
xi, 260 pages : illustrations ; 24 cm
Format :


Call Number
Material Type
Home Location
Item Holds
QA76.9.A25 I58 2000 Adult Non-Fiction Central Closed Stacks

On Order



This book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures -- data preservation and protection -- hardware and software protection -- personnel management and security -- network security -- contingency planning -- legal and auditing planning and control and more.

Author Notes

Jae K. Shim, Ph.D., is professor of business administration at California State University, Long Beach
Anique Qureshi, Ph.D., CPA, CIA, is associate professor of accounting and information systems at Queens College of the City University of New York
Joel G. Siegel, Ph.D., CPA, is a consultant and professor of accounting, finance, and information systems, Queens College of the City University of New York

Table of Contents

About the Authorsp. ix
What This Book Will do For Youp. xi
Chapter 1 Organizational Policyp. 1
Chapter 2 Physical Security and Data Preservationp. 11
Chapter 3 Hardware Securityp. 33
Chapter 4 Software Securityp. 67
Chapter 5 Personnel Securityp. 109
Chapter 6 Network Securityp. 117
Appendix 6.A Commercial Firewallsp. 145
Appendix 6.B Firewall Resellersp. 153
Appendix 6.C Public Domain, Shareware, etc.p. 163
Chapter 7 Security Policyp. 165
Appendix 7.A Sources of Information Security Policiesp. 178
Appendix 7.B Sample Computer Policyp. 179
Chapter 8 Contingency Planningp. 191
Appendix 8.A Business Impact Analysis Worksheetp. 213
Appendix 8.B Communications Assessment Questionnairep. 215
Appendix 8.C Insurance Recovery Programp. 217
Appendix 8.D Making an Insurance Claimp. 219
Chapter 9 Auditing and Legal Issuesp. 221
Appendix Security Softwarep. 235
Indexp. 241