11th National Computer Security Conference
Title | 11th National Computer Security Conference PDF eBook |
Author | |
Publisher | |
Pages | 374 |
Release | 1988 |
Genre | Computers |
ISBN |
13th National Computer Security Conference
Title | 13th National Computer Security Conference PDF eBook |
Author | |
Publisher | |
Pages | 400 |
Release | 1990 |
Genre | Computer security |
ISBN |
13th National Computer Security Conference
Title | 13th National Computer Security Conference PDF eBook |
Author | |
Publisher | |
Pages | 878 |
Release | 1990 |
Genre | Computer security |
ISBN |
National Computer Security Conference, 1993 (16th) Proceedings
Title | National Computer Security Conference, 1993 (16th) Proceedings PDF eBook |
Author | DIANE Publishing Company |
Publisher | DIANE Publishing |
Pages | 568 |
Release | 1995-08 |
Genre | |
ISBN | 9780788119248 |
Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.
18th National Information Systems Security Conference
Title | 18th National Information Systems Security Conference PDF eBook |
Author | |
Publisher | |
Pages | 426 |
Release | 1995 |
Genre | Computer security |
ISBN |
National Computer Security Conference Proceedings, 1992
Title | National Computer Security Conference Proceedings, 1992 PDF eBook |
Author | DIANE Publishing Company |
Publisher | DIANE Publishing |
Pages | 416 |
Release | 1992-11 |
Genre | |
ISBN | 9780788102219 |
Held October 13-16, 1992. Emphasizes information systems security criteria (& how it affects us), and the actions associated with organizational accreditation. These areas are highlighted by emphasizing how organizations are integrating information security solutions. Includes presentations from government, industry and academia and how they are cooperating to extend the state-of-the-art technology to information systems security. 72 referred papers, trusted systems tutorial and 23 executive summaries. Very valuable! Must buy!
Computer System and Network Security
Title | Computer System and Network Security PDF eBook |
Author | Gregory B. White |
Publisher | CRC Press |
Pages | 338 |
Release | 2017-12-14 |
Genre | Computers |
ISBN | 135145871X |
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference. Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage control. Later chapters address network and database security and systems/networks connected to wide-area networks and internetworks. Other topics include firewalls, cryptography, malicious software, and security standards. The book includes case studies with information about incidents involving computer security, illustrating the problems and potential damage that can be caused when security fails. This unique reference/textbook covers all aspects of computer and network security, filling an obvious gap in the existing literature.