Computer Security, Third Edition contains the best ideas on recent advances in computer hardware and the spread of personal computer technology. It includes a complete and comprehensive introduction to computer security, as well as coverage of computer crime, systems security, and cryptology. Convinced that there is no such thing as computer security, only various degrees of insecurity, John Carroll presents the best concepts that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This thoroughly enhanced third edition is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. In addition to completely updating the original matter, Computer Security, Third Edition includes new information on: computer crime and the law; physical security; communications; surveillance; and risk management.
Computer Security, Third Edition contains the best ideas on recent advances in computer hardware and the spread of personal computer technology. It includes a complete and comprehensive introduction to computer security, as well as coverage of computer crime, systems security, and cryptology. Convinced that there is no such thing as computer security, only various degrees of insecurity, John Carroll presents the best concepts that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This thoroughly enhanced third edition is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. In addition to completely updating the original matter, Computer Security, Third Edition includes new information on: computer crime and the law; physical security; communications; surveillance; and risk management.
Part I.THE THREAT TO COMPUTER SECURITY, 1 Essentials of Computer
Security, 2 Computer Crime and the Law, Part II.SECURITY MANAGEMENT
CONSIDERATIONS, 3 Organizing for Information Management,4
Protection of matter, 5 Screening and Management of Personnel, 6
Physical Access Control, 7 Physical Security, 8 Environmental, 9
Disaster Control, Part III. COMMUNICATIONS SECURITY, 10 Line
Security, 11 Transmission Security, 12 Cryptographic Security, 13
Emanations, 14 Technical Security, Part IV.
SYSTEMS SECURITY, 15 Systems Identification, 16 Isolation in
computer systems, 17 Systems Access Control, 18 Detection and
Surveillance, 19 Systems Integrity, 20 Systems Reliability and
Security, 21 Security and Personal Computers, Part V. INFORMATION
SECURITY RISK ANALYSIS, 22 Systems Approach to Risk Management, 23
Threat Assessment, 24 Assets and Safeguards, 25 Keeping Secrets in
Computers, 26 Modes of Risk Analysis, Appendix: Sample Log Forms,
Glossary, Selected Bibliography, Index.
An updated of the classic book by Butterworth-Heinemann with new
material on recent advances in computer hardware and the spread of
personal computer technology.
A complete and comprehensive introduction to computer security.
Includes coverage on computer crime, physical security,
communications, systems security, and risk management.
John M. Carroll is a professor of computer science, education, and psychology, and director of the Center for Human-Computer Interaction at Virginia Tech. He has written over 250 technical papers, 20 conference plenary addresses, and 12 books.
![]() |
Ask a Question About this Product More... |
![]() |