01456cam a2200181 a 4500020002700000022001800027050001700045100002100062245004200083250001200125260005100137300003600188500001900224505092400243650006301167650002301230650002101253 a0750696001 (hardcover) a978075069600500aQA76.9b.C131 aCarroll, John M.10aComputer security /cJohn M. Carroll. a3rd ed. aBoston, Mass. :bButterworth-Heinemann,c1996. axviii, 648 p. :bill. ;c24 cm. aIncludes index aCh. 1. Essentials of Computer Security -- Ch. 2. Computer Crime and the Law -- Ch. 3. Organizing for EDP Security -- Ch. 4. Protection of Information -- Ch. 5. Screening and Management of Personnel -- Ch. 6. Physical Access Control -- Ch. 7. Physical Security -- Ch. 8. Environmental Security -- Ch. 9. Disaster Control -- Ch. 10. Line Security -- Ch. 11. Transmission Security -- Ch. 12. Cryptographic Security -- Ch. 13. Emanations Security -- Ch. 14. Technical Security -- Ch. 15. Systems Identification -- Ch. 16. Isolation in Computer Systems -- Ch. 17. Systems Access Control -- Ch. 18. Detection and Surveillance -- Ch. 19. Systems Integrity -- Ch. 20. Systems Reliability and Security -- Ch. 21. Security and Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24. Assets and Safeguards -- Ch. 25. Keeping Secrets in Computers -- Ch. 26. Modes of Risk Analysis. 0aElectronic data processing departmentsxSecurity measures. 0aComputer security. 0aComputer crimes.