Normal view MARC view ISBD view

Computer Security.

By: Hsiao, David K.
Contributor(s): Kerr, Douglas S | Madnick, Stuart E | Ashenhurst, Robert L.
Material type: materialTypeLabelBookPublisher: Saint Louis : Elsevier Science & Technology, 2014Copyright date: ©1979Description: 1 online resource (318 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781483218373.Subject(s): Computers -- Access control | Electronic data processing departments -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: Computer SecurityDDC classification: 005.8 Online resources: Click here to view book
Contents:
Front Cover -- Computer Security -- Copyright Page -- Table of Contents -- Dedication -- FOREWORD -- PREFACE -- ACKNOWLEDGMENTS -- Chapter 1. INTRODUCTION -- POSTSCRIPT -- REFERENCES-BOOKS AND MONOGRAPHS -- REFERENCES-BIBLIOGRAPHIES -- Chapter 2. PRIVACY AND ITS TECHNICAL IMPLICATIONS ON SECURITY -- 2.1 BACKGROUND -- 2.2 LEGISLATION -- 2.3 COST OF PRIVACY -- 2.4 FUTURE DEVELOPMENTS -- 2.5 TECHNICAL IMPLICATIONS FOR SECURITY -- 2.6 POSTSCRIPT -- REFERENCES -- Chapter 3. OPERATIONAL SECURITY -- 3.1 INTRODUCTION -- 3.2 OPERATIONAL CONSIDERATIONS -- 3.3 ORGANIZATIONAL IMPACT -- 3.4 ECONOMICS -- 3.5 SECURITY OBJECTIVES AND ACCOUNTABILITY -- 3.6 POSTSCRIPT -- REFERENCES -- Chapter 4. PHYSICAL SECURITY -- 4.1 AGAINST NATURAL DISASTERS -- 4.2 AGAINST INTRUDERS -- 4.3 IDENTIFICATION AND AUTHENTICATION -- 4.4 AGAINST ELECTRONIC AND ELECTROMAGNETIC TAMPERING -- 4.5 POSTSCRIPT -- REFERENCES -- Chapter 5. HARDWARE SECURITY -- 5.1 MEMORY PROTECTION -- 5.2 MULTIPLE EXECUTION STATES -- 5.3 MICROPROCESSORS AS SECURITY AIDS -- 5.4 MINICOMPUTERS AS SECURITY CONTROLLERS -- 5.5 HARDWARE REALIZATION OF OPERATING SYSTEM FEATURES -- 5.6 SUMMARY REMARKS -- 5.7 POSTSCRIPT -- REFERENCES -- Chapter 6. CRYPTOGRAPHIC TRANSFORMATIONS -- 6.1 CRYPTOGRAPHY -- 6.2 CRYPTOGRAPHIC TRANSFORMATION SYSTEMS -- 6.3 POSTSCRIPT -- REFERENCES -- Chapter 7. OPERATING SYSTEM SECURITY -- 7.1 SURVEILLANCE -- 7.2 ACCESS CONTROL -- 7.3 ISOLATION -- 7.4 DESIGN AND IMPLEMENTATION OF SECURE OPERATING SYSTEMS -- 7.5 POSTSCRIPT -- REFERENCES -- Chapter 8. DATABASE SECURITY -- 8.1 ACCESS DECISIONS -- 8.2 ACCESS PATHS -- 8.3 ACCESS AUTHORIZATION AND RESOLUTION -- 8.4 IMPLEMENTATION AND PLACEMENT OF SECURITY FEATURES -- 8.5 POSTSCRIPT -- REFERENCES -- AUTHOR INDEX -- SUBJECT INDEX.
Summary: Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.A25 -- .H753 1979 (Browse shelf) http://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=1876810 Available EBC1876810

Front Cover -- Computer Security -- Copyright Page -- Table of Contents -- Dedication -- FOREWORD -- PREFACE -- ACKNOWLEDGMENTS -- Chapter 1. INTRODUCTION -- POSTSCRIPT -- REFERENCES-BOOKS AND MONOGRAPHS -- REFERENCES-BIBLIOGRAPHIES -- Chapter 2. PRIVACY AND ITS TECHNICAL IMPLICATIONS ON SECURITY -- 2.1 BACKGROUND -- 2.2 LEGISLATION -- 2.3 COST OF PRIVACY -- 2.4 FUTURE DEVELOPMENTS -- 2.5 TECHNICAL IMPLICATIONS FOR SECURITY -- 2.6 POSTSCRIPT -- REFERENCES -- Chapter 3. OPERATIONAL SECURITY -- 3.1 INTRODUCTION -- 3.2 OPERATIONAL CONSIDERATIONS -- 3.3 ORGANIZATIONAL IMPACT -- 3.4 ECONOMICS -- 3.5 SECURITY OBJECTIVES AND ACCOUNTABILITY -- 3.6 POSTSCRIPT -- REFERENCES -- Chapter 4. PHYSICAL SECURITY -- 4.1 AGAINST NATURAL DISASTERS -- 4.2 AGAINST INTRUDERS -- 4.3 IDENTIFICATION AND AUTHENTICATION -- 4.4 AGAINST ELECTRONIC AND ELECTROMAGNETIC TAMPERING -- 4.5 POSTSCRIPT -- REFERENCES -- Chapter 5. HARDWARE SECURITY -- 5.1 MEMORY PROTECTION -- 5.2 MULTIPLE EXECUTION STATES -- 5.3 MICROPROCESSORS AS SECURITY AIDS -- 5.4 MINICOMPUTERS AS SECURITY CONTROLLERS -- 5.5 HARDWARE REALIZATION OF OPERATING SYSTEM FEATURES -- 5.6 SUMMARY REMARKS -- 5.7 POSTSCRIPT -- REFERENCES -- Chapter 6. CRYPTOGRAPHIC TRANSFORMATIONS -- 6.1 CRYPTOGRAPHY -- 6.2 CRYPTOGRAPHIC TRANSFORMATION SYSTEMS -- 6.3 POSTSCRIPT -- REFERENCES -- Chapter 7. OPERATING SYSTEM SECURITY -- 7.1 SURVEILLANCE -- 7.2 ACCESS CONTROL -- 7.3 ISOLATION -- 7.4 DESIGN AND IMPLEMENTATION OF SECURE OPERATING SYSTEMS -- 7.5 POSTSCRIPT -- REFERENCES -- Chapter 8. DATABASE SECURITY -- 8.1 ACCESS DECISIONS -- 8.2 ACCESS PATHS -- 8.3 ACCESS AUTHORIZATION AND RESOLUTION -- 8.4 IMPLEMENTATION AND PLACEMENT OF SECURITY FEATURES -- 8.5 POSTSCRIPT -- REFERENCES -- AUTHOR INDEX -- SUBJECT INDEX.

Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.

Description based on publisher supplied metadata and other sources.

There are no comments for this item.

Log in to your account to post a comment.