Information Systems Security: A Practitioner's ReferenceVan Nostrand Reinhold, 1993 - 471 lappuses |
Saturs
DATA CLASSIFICATION | 5 |
INVESTIGATION | 11 |
CRYPTOGRAPHY | 21 |
Autortiesības | |
12 citas sadaļas nav parādītas.
Bieži izmantoti vārdi un frāzes
access control ADP system algorithm analysis application assets attack audit automated Automated Information System backup bits block Chapter cipher ciphertext classification communications computer crime Computer Security computer system computer virus confidential cost covert channel criminal Cryptography data processing database defined digital signature disclosure disk diskette documents employees enciphering encipherment encryption ensure environment evaluation example exposure files FIPS PUB 39 formal Fort George G functions guidelines hardware identified implementation individual information security information systems security input integrity involved ISC)² mainframe methods microcomputers operating system organization output packages password penetration person personal computer personnel physical problems procedures protection public key RACF requirements responsibility risk security policy security professional sensitive separation of duties specific Standards storage stream cipher TCSEC terminal threats tion unauthorized virus vulnerability
Atsauces uz šo grāmatu
High-technology-crime Investigator's Handbook: Working in the Global ... Gerald L. Kovacich,William C. Boni Priekšskatījums nav pieejams - 2000 |
Information Security Policies, Procedures, and Standards: Guidelines for ... Thomas R. Peltier Ierobežota priekšskatīšana - 2016 |