728 lines
41 KiB
Plaintext
728 lines
41 KiB
Plaintext
|
|
|||
|
BIBLIOGRAPHY OF COMPUTER SECURITY BOOKS
|
|||
|
(1973 through 1988)
|
|||
|
|
|||
|
Note: A bibliography is now being developed to encompass 1989.
|
|||
|
|
|||
|
|
|||
|
ABUSE/MISUSE/CRIME
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Fennelly, Lawrence J.
|
|||
|
|
|||
|
TITLE: Handbook of Loss Prevention and Crime
|
|||
|
Prevention
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: Second
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: October 1988
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
COST: $69.95
|
|||
|
DESCRIPTION: This book brings together the
|
|||
|
expertise of over 40 security and crime prevention
|
|||
|
professionals with information on the latest
|
|||
|
technology, trends, and references.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Lobel, Jerome
|
|||
|
|
|||
|
TITLE: Foiling The Systems Breakers
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: McGraw-Hill Book Company
|
|||
|
LOCATION OF PUBLISHER: New York
|
|||
|
PUBLICATION DATE: 1986
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
COST: $34.95
|
|||
|
DESCRIPTION: This book is designed to help system
|
|||
|
designers and data processing staff find ways to
|
|||
|
protect computer systems from unauthorized access.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: U.S. Department of Justice
|
|||
|
|
|||
|
TITLE: Computer Crime: Computer Security
|
|||
|
Techniques
|
|||
|
ORGANIZATION: U.S. Department of Justice
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: U.S. Department of Justice
|
|||
|
LOCATION OF PUBLISHER: Washington, D.C.
|
|||
|
PUBLICATION DATE: Not Given TBD
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
COST: Free
|
|||
|
DESCRIPTION: Presents the results of a major
|
|||
|
review of the computer security procedures
|
|||
|
currently employed in the public and private
|
|||
|
sectors.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: U.S. Department of Justice
|
|||
|
|
|||
|
TITLE: Computer Crime: Electronic Fund Transfer
|
|||
|
Systems and Crime
|
|||
|
ORGANIZATION: U.S. Department of Justice
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: U.S. Department of Justice
|
|||
|
LOCATION OF PUBLISHER: Washington, D.C.
|
|||
|
PUBLICATION DATE: 1982
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
COST: Free
|
|||
|
DESCRIPTION: Reviews the crime-related
|
|||
|
implications of the growth of computer usage in
|
|||
|
EFT, and the nature and magnitude of EFT crimes.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Van Duyn, Julia
|
|||
|
|
|||
|
TITLE: The Human Factor in Computer Crime
|
|||
|
|
|||
|
ORGANIZATION: Institute of Internal Auditors
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO:
|
|||
|
NAME OF PUBLISHER: Petrocelli Books, Inc.
|
|||
|
LOCATION OF PUBLISHER: New York, Princeton
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: States that insiders in a company
|
|||
|
are the ones most likely to commit computer abuse.
|
|||
|
A list of procedures that management can follow to
|
|||
|
make their installation secure is included.
|
|||
|
|
|||
|
|
|||
|
ACCESS CONTROL
|
|||
|
|
|||
|
AUTHOR: Abrams, M.D. and Podell, H.J.
|
|||
|
|
|||
|
TITLE: Computer and Network Security
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Computer Society
|
|||
|
LOCATION OF PUBLISHER: Los Alamitos, CA
|
|||
|
PUBLICATION DATE: 1987
|
|||
|
CATEGORY: Access Control
|
|||
|
COST: $50.00
|
|||
|
DESCRIPTION: Examines information system security
|
|||
|
with regard to computer, data, and network
|
|||
|
security.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bowers, Dan M.
|
|||
|
|
|||
|
TITLE: Access Control and Personal Identification
|
|||
|
Systems
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: 1988
|
|||
|
CATEGORY: Access Control
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: Presents a thorough examination of
|
|||
|
access control systems and devices for security
|
|||
|
managers and practitioners in the field.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Davies, D.W. and Price, W.L.
|
|||
|
|
|||
|
TITLE: Security for Computer Networks: An
|
|||
|
Introduction to Data Security in Teleprocessing
|
|||
|
ORGANIZATION: National Physical Laboratory
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: John Wiley & Sons, Inc.
|
|||
|
LOCATION OF PUBLISHER: New York
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: Access Control
|
|||
|
COST: $34.95
|
|||
|
DESCRIPTION: Covers all aspects of network security
|
|||
|
from information protection and data integrity to
|
|||
|
user identification and authentication. It
|
|||
|
emphasizes cryptography exclusively as the means
|
|||
|
of protecting data in networks.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Foster, Caxton C.
|
|||
|
|
|||
|
TITLE: Cryptoanalysis for Microcomputers
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Hayden Book Company. Inc.
|
|||
|
LOCATION OF PUBLISHER: Rochelle Park, NJ
|
|||
|
PUBLICATION DATE: 1982
|
|||
|
CATEGORY: Access Control
|
|||
|
COST:
|
|||
|
DESCRIPTION: This books discusses cryptoanalyst
|
|||
|
programs for microcomputers and provides programs
|
|||
|
written in basic.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Katzan, Harry Jr.
|
|||
|
|
|||
|
TITLE: The Standard Data Encryption Algorithm
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Petrocelli Books, Inc.
|
|||
|
LOCATION OF PUBLISHER: Princeton, NJ
|
|||
|
PUBLICATION DATE: 1977
|
|||
|
CATEGORY: Access Control
|
|||
|
COST: $14.00
|
|||
|
DESCRIPTION: This book provides a thorough
|
|||
|
understanding of data encryption algorithm
|
|||
|
techniques and their implementation.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUDIT AND EVALUATION
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Kvong, Javier F.
|
|||
|
|
|||
|
TITLE: Computer Auditing, Security, and Internal
|
|||
|
Control Manual
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Prentice Hall, Inc.
|
|||
|
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
|||
|
PUBLICATION DATE: 1987
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
COST: $59.95
|
|||
|
DESCRIPTION: This book shows how to test internal
|
|||
|
controls and the integrity of a computer system.
|
|||
|
It also gives a checklist and guidelines for
|
|||
|
evaluating the controls and security of computer
|
|||
|
installations.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Plagman, Bernard K. and Ross, Steven J.
|
|||
|
|
|||
|
TITLE: Audit and Control Systems Programming
|
|||
|
Activities
|
|||
|
ORGANIZATION: Institute of Internal Auditors
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Institute of Internal Auditors
|
|||
|
LOCATION OF PUBLISHER: Altamonte Springs, FL
|
|||
|
PUBLICATION DATE: 1985
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
COST: $33.00
|
|||
|
DESCRIPTION: This books describes techniques that
|
|||
|
can be used to audit the activities of systems
|
|||
|
programmers. A composite profile is included of
|
|||
|
what constitutes good systems programming activity.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Rothberg, Gabriel B.
|
|||
|
|
|||
|
TITLE: Structured EDP Auditing
|
|||
|
|
|||
|
ORGANIZATION: Institute of Internal Auditors
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Lifetime Learning Publications
|
|||
|
LOCATION OF PUBLISHER: Altamonte Springs, FL
|
|||
|
PUBLICATION DATE: 1983
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
COST: $33.95
|
|||
|
DESCRIPTION: This book shows how to go about
|
|||
|
reviewing and establishing an EDP audit function.
|
|||
|
Also included is how to define a DP environment
|
|||
|
and identify its problems.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Wood, Charles, Banks, William, Garcia, Abel
|
|||
|
Guarro, Sergio, Hampel, Viktor, Sartorio, Henry
|
|||
|
TITLE: Computer Security: A Comprehensive
|
|||
|
Controls Checklist
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: John Wiley & Sons
|
|||
|
LOCATION OF PUBLISHER: Somerset, NJ
|
|||
|
PUBLICATION DATE: 1987
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
COST: 56.95
|
|||
|
DESCRIPTION: This books provides computer security
|
|||
|
procedures and related checklists. It is designed
|
|||
|
to assist in determining the integrity of security
|
|||
|
controls.
|
|||
|
|
|||
|
|
|||
|
CONTINGENCY PLANNING
|
|||
|
|
|||
|
AUTHOR: The Chantico Series
|
|||
|
|
|||
|
TITLE: Disaster Recovery: Contingency Planning
|
|||
|
and Program Evaluation
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Q.E.D. Information Sciences
|
|||
|
LOCATION OF PUBLISHER: Wellesley, MA
|
|||
|
PUBLICATION DATE: 1985
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: This book discusses the phases of a
|
|||
|
disaster recovery program including establishing
|
|||
|
requirements, conducting the review program, and
|
|||
|
evaluating the disaster recovery program.
|
|||
|
|
|||
|
|
|||
|
DATA BASE MANAGEMENT
|
|||
|
|
|||
|
AUTHOR: Fernandex, E.B., Summers, R.C., and
|
|||
|
Wood, C.
|
|||
|
TITLE: The Systems Programming Series Database
|
|||
|
Security and Integrity
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO: 14467
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Addison-Wesley Publishers
|
|||
|
LOCATION OF PUBLISHER: Reading, MA
|
|||
|
PUBLICATION DATE: 1981
|
|||
|
CATEGORY: Data Base Security
|
|||
|
COST: $20.95
|
|||
|
DESCRIPTION: This book is concerned with the
|
|||
|
security and integrity of information that is
|
|||
|
maintained in data bases.
|
|||
|
|
|||
|
|
|||
|
GENERAL SECURITY
|
|||
|
|
|||
|
AUTHOR: Bosworth, Bruce
|
|||
|
|
|||
|
TITLE: Codes, Ciphers, And Computers
|
|||
|
An Introduction to Information Security
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Hayden Book Company, Inc.
|
|||
|
LOCATION OF PUBLISHER: New York
|
|||
|
PUBLICATION DATE: 1983
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $14.95
|
|||
|
DESCRIPTION: This book presents the fundamentals
|
|||
|
of traditional and modern cryptographic techniques.
|
|||
|
It also provides modern techniques for the highest
|
|||
|
levels of security for data and information.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Buck, Edward
|
|||
|
|
|||
|
TITLE: Introduction to Data Security & Controls
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Q.E.D. Information Sciences
|
|||
|
LOCATION OF PUBLISHER: Wellesley, MA
|
|||
|
PUBLICATION DATE: 1982
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: This book presents the general context
|
|||
|
of data security, including the need for security
|
|||
|
and the reasons earlier approaches are no
|
|||
|
longer sufficient. It also gives new methods for
|
|||
|
dealing with data security.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Carroll, John M.
|
|||
|
|
|||
|
TITLE: Computer Security
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: Second
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: 1987
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $32.95
|
|||
|
DESCRIPTION: This book is divided into six sections
|
|||
|
covering threats, security management
|
|||
|
considerations, physical security, communications
|
|||
|
security, system security, and threat evaluation.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Chantico Technical Management Series
|
|||
|
|
|||
|
TITLE: Security Evaluation For Small Computer
|
|||
|
Centers
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Q.E.D. Information Sciences
|
|||
|
LOCATION OF PUBLISHER: Wellesley, MA
|
|||
|
PUBLICATION DATE: 1985
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: This book is concerned with the
|
|||
|
activities required to review and evaluate the
|
|||
|
security of small computer centers. It presents all
|
|||
|
the major elements to be considered in a review.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Cooper, James Arlin
|
|||
|
|
|||
|
TITLE: Computer Security Technology
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Lexington Books
|
|||
|
LOCATION OF PUBLISHER: Lexington, MA
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $35.00
|
|||
|
DESCRIPTION:
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Gallery, Shari Mendelson, ed.
|
|||
|
|
|||
|
TITLE: Computer Security: Readings from
|
|||
|
"Security Management" Magazine
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: 1987
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: An assortment of readings concerning
|
|||
|
a wide variety of computer security areas from
|
|||
|
"Security Management" magazine.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Fisher, Royal P.
|
|||
|
|
|||
|
TITLE: Information Systems Security
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Prentice-Hall, Inc.
|
|||
|
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: This book not only focuses on the role
|
|||
|
of management in computer security, but it also
|
|||
|
looks at practical ways of strengthening security
|
|||
|
in information systems.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Landreth, Bill
|
|||
|
|
|||
|
TITLE: Out of The Inner Circle
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Microsoft Press
|
|||
|
LOCATION OF PUBLISHER: Bellevue, Washington
|
|||
|
PUBLICATION DATE: 1985
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $9.95
|
|||
|
DESCRIPTION: This book examines a wide variety of
|
|||
|
computer hackers' approaches and techniques.
|
|||
|
Provides a security checklist identifying the
|
|||
|
security loopholes exploited by hackers today.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Leiss, Ernst L.
|
|||
|
|
|||
|
TITLE: Principles of Data Security
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Plenum Press
|
|||
|
LOCATION OF PUBLISHER: New York, NY
|
|||
|
PUBLICATION DATE: 1982
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $32.50 plus $1.50 for shipping.
|
|||
|
DESCRIPTION: This book presents a comprehensive
|
|||
|
study of security for computers and their data
|
|||
|
bases. Authorization mechanisms and cryptography
|
|||
|
systems are explained in detail.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Martin, James
|
|||
|
|
|||
|
TITLE: Security, Accuracy, And Privacy In
|
|||
|
Computer Systems
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Prentice-Hall, Inc.
|
|||
|
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
|||
|
PUBLICATION DATE: 1973
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $65.00
|
|||
|
DESCRIPTION: This book provides a codification of
|
|||
|
information on computer accuracy, security, and
|
|||
|
privacy.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Norman, Adrien
|
|||
|
|
|||
|
TITLE: Computer Insecurity
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Methuen, Inc.
|
|||
|
LOCATION OF PUBLISHER: New York, NY
|
|||
|
PUBLICATION DATE: 1985
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $16.95
|
|||
|
DESCRIPTION: This book presents actual cases of
|
|||
|
computer security breaches.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Schweitzer, James A.
|
|||
|
|
|||
|
TITLE: Computers, Business, and Security: The
|
|||
|
New Role for Security
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: 1987
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: This book covers the essentials of
|
|||
|
establishing a secure work environment including
|
|||
|
implementing a security program.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Turn, Rein, ed.
|
|||
|
|
|||
|
TITLE: Advances in Computer Systems Security
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Artech House, Inc.
|
|||
|
LOCATION OF PUBLISHER: Dedham, MA
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $44.00
|
|||
|
DESCRIPTION: This book contains a variety of
|
|||
|
articles and technical papers that discuss
|
|||
|
some aspect of computer security.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Wood, Michael B.
|
|||
|
|
|||
|
TITLE: Introducing Computer Security
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: John Wiley and Sons, Inc.
|
|||
|
LOCATION OF PUBLISHER: Somerset, NJ
|
|||
|
PUBLICATION DATE: 1982
|
|||
|
CATEGORY: General Security
|
|||
|
COST: $18.60
|
|||
|
DESCRIPTION: This book stresses that an effective
|
|||
|
security program needs to be incorporated into an
|
|||
|
organization. Written with the non-specialist in
|
|||
|
mind, it covers both intentional and accidental
|
|||
|
threats, which can affect computer systems.
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Carroll, John M.
|
|||
|
|
|||
|
TITLE: Managing Risk: A Computer-Aided Strategy
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: Risk Management
|
|||
|
COST: $24.95
|
|||
|
DESCRIPTION: This book is a "how to" manual on
|
|||
|
quantifing risk management using your computer
|
|||
|
as an active tool in accessing and reducing loss.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Cronin, Daniel J.
|
|||
|
|
|||
|
TITLE: Microcomputer Data Security: Issues and
|
|||
|
Strategies
|
|||
|
ORGANIZATION:
|
|||
|
ORDER NO: ISBN 0-89303-672-2
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Prentice Hall, Inc.
|
|||
|
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
|||
|
PUBLICATION DATE: 1986
|
|||
|
CATEGORY: Microcomputer Security
|
|||
|
COST: $18.95 plus $1.50 shipping & handling
|
|||
|
DESCRIPTION: This book examines the microcomputer
|
|||
|
and offers a variety of practical solutions to
|
|||
|
both hardware and software integrity problems.
|
|||
|
Deals mainly with IBM and IBM-compatible systems.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Hansen, James V. and Romney, Marshell B.
|
|||
|
|
|||
|
TITLE: An Introduction to Microcomputers and
|
|||
|
Their Controls
|
|||
|
ORGANIZATION: Institute of Internal Auditors
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Institute of Internal Auditors
|
|||
|
LOCATION OF PUBLISHER: Altamonte Springs, FL
|
|||
|
PUBLICATION DATE: 1985
|
|||
|
CATEGORY: Microcomputer Security
|
|||
|
COST: $33.00
|
|||
|
DESCRIPTION: This book covers the unique problems
|
|||
|
that will be found on individual systems and the
|
|||
|
control strategies to correct these problems. The
|
|||
|
subjects include principles of control and
|
|||
|
security, risks and potential losses, and implemen-
|
|||
|
tation of actions.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Highland, Harold Joseph
|
|||
|
|
|||
|
TITLE: Protecting Your Microcomputer System
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: John Wiley & Sons, Inc.
|
|||
|
LOCATION OF PUBLISHER: Somerset, NJ
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: Microcomputer Security
|
|||
|
COST: $14.95 plus local sales tax.
|
|||
|
DESCRIPTION: This book identifies the risks that
|
|||
|
can destroy a microcomputer system and shows how
|
|||
|
to safeguard the computer from a variety of hazards
|
|||
|
that threaten the system.
|
|||
|
|
|||
|
|
|||
|
RISK MANAGEMENT
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Broder, James F.
|
|||
|
|
|||
|
TITLE: Risk Analysis And The Security Survey
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: 1984
|
|||
|
CATEGORY: Risk Management
|
|||
|
COST: $26.95
|
|||
|
DESCRIPTION: This book shows where security
|
|||
|
allocations may be inadequate, or where resources
|
|||
|
may be wasted, and how to apply the practical
|
|||
|
concepts of risk analysis.
|
|||
|
|
|||
|
SECURITY MANAGEMENT
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Parker, Donn B.
|
|||
|
|
|||
|
TITLE: Computer Security Management
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Prentice Hall Publisher
|
|||
|
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
|||
|
PUBLICATION DATE: 1981
|
|||
|
CATEGORY: Security Management
|
|||
|
COST: $40.00
|
|||
|
DESCRIPTION: A basic text on problems, concepts,
|
|||
|
theories, and practices in the management of
|
|||
|
computer security.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Schweitzer, James A.
|
|||
|
|
|||
|
TITLE: Managing Information Security: A Program
|
|||
|
for the Electronic Information Age
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Butterworth Publishers
|
|||
|
LOCATION OF PUBLISHER: Stoneham, MA
|
|||
|
PUBLICATION DATE: 1982
|
|||
|
CATEGORY: Security Management
|
|||
|
COST: $26.95
|
|||
|
DESCRIPTION: This book surveys the information
|
|||
|
processing environment and offers proven, tested
|
|||
|
approaches to effectively safeguard vital
|
|||
|
electronic information.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Schweitzer, James A.
|
|||
|
|
|||
|
TITLE: Protecting Information in the Electronic
|
|||
|
Workplace: A Guide for Managers
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Reston Publishers
|
|||
|
LOCATION OF PUBLISHER: Reston, VA
|
|||
|
PUBLICATION DATE: 1983
|
|||
|
CATEGORY: Security Management
|
|||
|
COST: $36.00
|
|||
|
DESCRIPTION: This book gives a structure for
|
|||
|
information security. It discusses the protection
|
|||
|
of personal workstations, cases of fraud, and
|
|||
|
examples of applying security in the computer
|
|||
|
environment.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Talbot, J.R.
|
|||
|
|
|||
|
TITLE: Management Guide to Computer Security
|
|||
|
|
|||
|
ORGANIZATION:
|
|||
|
VOLUME NO:
|
|||
|
EDITION NO: First
|
|||
|
NAME OF PUBLISHER: Gower Publishing Co., LTD.
|
|||
|
LOCATION OF PUBLISHER: Brookfield, VT
|
|||
|
PUBLICATION DATE: 1981
|
|||
|
CATEGORY: Security Management
|
|||
|
COST: $36.95
|
|||
|
DESCRIPTION: This book describes a wide range of
|
|||
|
computer security considerations a manager might
|
|||
|
want to keep in mind. Risks to installations and
|
|||
|
steps to prevent damage to computers are covered.
|
|||
|
|