The Data Processing Security Game
Title | The Data Processing Security Game PDF eBook |
Author | Robert S. Becker |
Publisher | Elsevier |
Pages | 112 |
Release | 2014-05-18 |
Genre | Business & Economics |
ISBN | 1483188183 |
The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is then discussed. This book then explains system security, backup procedure, control aspects, and business considerations. This selection will be very invaluable to those wanting to explore data processing security and apply it to a business environment.
Cryptography and Data Security
Title | Cryptography and Data Security PDF eBook |
Author | Dorothy Elizabeth Robling Denning |
Publisher | Addison Wesley Publishing Company |
Pages | 422 |
Release | 1982 |
Genre | History |
ISBN |
Encryption algorithms. Cryptographic technique. Access controls. Information controls. Inference controls.
Data Security and Data Processing: Study summary
Title | Data Security and Data Processing: Study summary PDF eBook |
Author | International Business Machines Corporation |
Publisher | |
Pages | 40 |
Release | 1974 |
Genre | Computer security |
ISBN |
Guidelines Establishing Requirements for Security and Confidentiality of Information Systems
Title | Guidelines Establishing Requirements for Security and Confidentiality of Information Systems PDF eBook |
Author | California. Intergovernmental Board on Electronic Data Processing |
Publisher | |
Pages | 114 |
Release | 1974 |
Genre | Buildings |
ISBN |
Security Standards for Data Processing
Title | Security Standards for Data Processing PDF eBook |
Author | Susan Wooldridge |
Publisher | |
Pages | 204 |
Release | 1973 |
Genre | Electronic data processing departments |
ISBN |
Risk/cost/benefit analysis; The security officer; Getting help with security problems; Personnel; The structure of the installation; Access control; System checks and control; File control.
Considerations in the Selection of Security Measures for Automatic Data Processing Systems
Title | Considerations in the Selection of Security Measures for Automatic Data Processing Systems PDF eBook |
Author | Michel J. Orceyre |
Publisher | |
Pages | 40 |
Release | 1978 |
Genre | Computer security |
ISBN |
Handbook of Research on Intelligent Data Processing and Information Security Systems
Title | Handbook of Research on Intelligent Data Processing and Information Security Systems PDF eBook |
Author | Bilan, Stepan Mykolayovych |
Publisher | IGI Global |
Pages | 434 |
Release | 2019-11-29 |
Genre | Computers |
ISBN | 1799812928 |
Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.