We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.
A shield attenuates electromagnetic signals, conducting them to ground before they can escape. A shield, which can be as small as a cable casing or as large as an entire building, is constructed in such a way that signals can't emanate ...
In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples...
"This is an excellent text that should be read by every computer security professional and student." Dick Kemmerer, University of California, Santa Barbara.
The Little Black Book of Computer Security
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense.
Privacy and its technical implications on security; Operational security; Physical security; Hardware security; Operating system security; Database security.
Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica
This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
Butler, J. G., and P. Badura. Contingency Planning and Disaster Recovery: Protecting Your Organization's Resources. Charleston, SC: Computer Technology Research Corp., 1997. Fulmer, K. L. Business Continuity Planning: A Step-by-Step ...
Cyber Security features articles from the WileyHandbook of Science and Technology for Homeland Security coveringtopics related to cyber security metrics and measure and related technologies that meet security needs.Specific applications to ...