Amazon cover image
Image from Amazon.com

Computer security / John M. Carroll.

By: Material type: TextPublication details: Boston, Mass. : Butterworth-Heinemann, 1996.Edition: 3rd edDescription: xviii, 648 p. : ill. ; 24 cmISBN:
  • 0750696001 (hardcover)
ISSN:
  • 9780750696005
Subject(s): LOC classification:
  • QA76.9 .C13
Contents:
Ch. 1. Essentials of Computer Security -- Ch. 2. Computer Crime and the Law -- Ch. 3. Organizing for EDP Security -- Ch. 4. Protection of Information -- Ch. 5. Screening and Management of Personnel -- Ch. 6. Physical Access Control -- Ch. 7. Physical Security -- Ch. 8. Environmental Security -- Ch. 9. Disaster Control -- Ch. 10. Line Security -- Ch. 11. Transmission Security -- Ch. 12. Cryptographic Security -- Ch. 13. Emanations Security -- Ch. 14. Technical Security -- Ch. 15. Systems Identification -- Ch. 16. Isolation in Computer Systems -- Ch. 17. Systems Access Control -- Ch. 18. Detection and Surveillance -- Ch. 19. Systems Integrity -- Ch. 20. Systems Reliability and Security -- Ch. 21. Security and Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24. Assets and Safeguards -- Ch. 25. Keeping Secrets in Computers -- Ch. 26. Modes of Risk Analysis.
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books Methodist University Library Main General Stacks QA76.9 .C13 (Browse shelf(Opens below)) Available 4398

Includes index

Ch. 1. Essentials of Computer Security --
Ch. 2. Computer Crime and the Law --
Ch. 3. Organizing for EDP Security --
Ch. 4. Protection of Information --
Ch. 5. Screening and Management of Personnel --
Ch. 6. Physical Access Control --
Ch. 7. Physical Security --
Ch. 8. Environmental Security --
Ch. 9. Disaster Control --
Ch. 10. Line Security --
Ch. 11. Transmission Security --
Ch. 12. Cryptographic Security --
Ch. 13. Emanations Security --
Ch. 14. Technical Security --
Ch. 15. Systems Identification --
Ch. 16. Isolation in Computer Systems --
Ch. 17. Systems Access Control --
Ch. 18. Detection and Surveillance --
Ch. 19. Systems Integrity --
Ch. 20. Systems Reliability and Security --
Ch. 21. Security and Personal Computers --
Ch. 22. Systems Approach to Risk Management --
Ch. 23. Threat Assessment --
Ch. 24. Assets and Safeguards --
Ch. 25. Keeping Secrets in Computers --
Ch. 26. Modes of Risk Analysis.

There are no comments on this title.

to post a comment.
Share
Copyright © 2026  MUG Library