728 lines
41 KiB
Plaintext
728 lines
41 KiB
Plaintext
|
||
BIBLIOGRAPHY OF COMPUTER SECURITY BOOKS
|
||
(1973 through 1988)
|
||
|
||
Note: A bibliography is now being developed to encompass 1989.
|
||
|
||
|
||
ABUSE/MISUSE/CRIME
|
||
|
||
|
||
AUTHOR: Fennelly, Lawrence J.
|
||
|
||
TITLE: Handbook of Loss Prevention and Crime
|
||
Prevention
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: Second
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: October 1988
|
||
CATEGORY: Abuse/Misuse/Crime
|
||
COST: $69.95
|
||
DESCRIPTION: This book brings together the
|
||
expertise of over 40 security and crime prevention
|
||
professionals with information on the latest
|
||
technology, trends, and references.
|
||
|
||
|
||
AUTHOR: Lobel, Jerome
|
||
|
||
TITLE: Foiling The Systems Breakers
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: McGraw-Hill Book Company
|
||
LOCATION OF PUBLISHER: New York
|
||
PUBLICATION DATE: 1986
|
||
CATEGORY: Abuse/Misuse/Crime
|
||
COST: $34.95
|
||
DESCRIPTION: This book is designed to help system
|
||
designers and data processing staff find ways to
|
||
protect computer systems from unauthorized access.
|
||
|
||
|
||
|
||
AUTHOR: U.S. Department of Justice
|
||
|
||
TITLE: Computer Crime: Computer Security
|
||
Techniques
|
||
ORGANIZATION: U.S. Department of Justice
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: U.S. Department of Justice
|
||
LOCATION OF PUBLISHER: Washington, D.C.
|
||
PUBLICATION DATE: Not Given TBD
|
||
CATEGORY: Abuse/Misuse/Crime
|
||
COST: Free
|
||
DESCRIPTION: Presents the results of a major
|
||
review of the computer security procedures
|
||
currently employed in the public and private
|
||
sectors.
|
||
|
||
|
||
AUTHOR: U.S. Department of Justice
|
||
|
||
TITLE: Computer Crime: Electronic Fund Transfer
|
||
Systems and Crime
|
||
ORGANIZATION: U.S. Department of Justice
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: U.S. Department of Justice
|
||
LOCATION OF PUBLISHER: Washington, D.C.
|
||
PUBLICATION DATE: 1982
|
||
CATEGORY: Abuse/Misuse/Crime
|
||
COST: Free
|
||
DESCRIPTION: Reviews the crime-related
|
||
implications of the growth of computer usage in
|
||
EFT, and the nature and magnitude of EFT crimes.
|
||
|
||
|
||
|
||
AUTHOR: Van Duyn, Julia
|
||
|
||
TITLE: The Human Factor in Computer Crime
|
||
|
||
ORGANIZATION: Institute of Internal Auditors
|
||
VOLUME NO:
|
||
EDITION NO:
|
||
NAME OF PUBLISHER: Petrocelli Books, Inc.
|
||
LOCATION OF PUBLISHER: New York, Princeton
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: Abuse/Misuse/Crime
|
||
COST: $24.95
|
||
DESCRIPTION: States that insiders in a company
|
||
are the ones most likely to commit computer abuse.
|
||
A list of procedures that management can follow to
|
||
make their installation secure is included.
|
||
|
||
|
||
ACCESS CONTROL
|
||
|
||
AUTHOR: Abrams, M.D. and Podell, H.J.
|
||
|
||
TITLE: Computer and Network Security
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Computer Society
|
||
LOCATION OF PUBLISHER: Los Alamitos, CA
|
||
PUBLICATION DATE: 1987
|
||
CATEGORY: Access Control
|
||
COST: $50.00
|
||
DESCRIPTION: Examines information system security
|
||
with regard to computer, data, and network
|
||
security.
|
||
|
||
|
||
AUTHOR: Bowers, Dan M.
|
||
|
||
TITLE: Access Control and Personal Identification
|
||
Systems
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: 1988
|
||
CATEGORY: Access Control
|
||
COST: $24.95
|
||
DESCRIPTION: Presents a thorough examination of
|
||
access control systems and devices for security
|
||
managers and practitioners in the field.
|
||
|
||
|
||
|
||
|
||
AUTHOR: Davies, D.W. and Price, W.L.
|
||
|
||
TITLE: Security for Computer Networks: An
|
||
Introduction to Data Security in Teleprocessing
|
||
ORGANIZATION: National Physical Laboratory
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: John Wiley & Sons, Inc.
|
||
LOCATION OF PUBLISHER: New York
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: Access Control
|
||
COST: $34.95
|
||
DESCRIPTION: Covers all aspects of network security
|
||
from information protection and data integrity to
|
||
user identification and authentication. It
|
||
emphasizes cryptography exclusively as the means
|
||
of protecting data in networks.
|
||
|
||
|
||
AUTHOR: Foster, Caxton C.
|
||
|
||
TITLE: Cryptoanalysis for Microcomputers
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Hayden Book Company. Inc.
|
||
LOCATION OF PUBLISHER: Rochelle Park, NJ
|
||
PUBLICATION DATE: 1982
|
||
CATEGORY: Access Control
|
||
COST:
|
||
DESCRIPTION: This books discusses cryptoanalyst
|
||
programs for microcomputers and provides programs
|
||
written in basic.
|
||
|
||
|
||
|
||
AUTHOR: Katzan, Harry Jr.
|
||
|
||
TITLE: The Standard Data Encryption Algorithm
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Petrocelli Books, Inc.
|
||
LOCATION OF PUBLISHER: Princeton, NJ
|
||
PUBLICATION DATE: 1977
|
||
CATEGORY: Access Control
|
||
COST: $14.00
|
||
DESCRIPTION: This book provides a thorough
|
||
understanding of data encryption algorithm
|
||
techniques and their implementation.
|
||
|
||
|
||
|
||
AUDIT AND EVALUATION
|
||
|
||
|
||
AUTHOR: Kvong, Javier F.
|
||
|
||
TITLE: Computer Auditing, Security, and Internal
|
||
Control Manual
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Prentice Hall, Inc.
|
||
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
||
PUBLICATION DATE: 1987
|
||
CATEGORY: Audit and Evaluation
|
||
COST: $59.95
|
||
DESCRIPTION: This book shows how to test internal
|
||
controls and the integrity of a computer system.
|
||
It also gives a checklist and guidelines for
|
||
evaluating the controls and security of computer
|
||
installations.
|
||
|
||
|
||
AUTHOR: Plagman, Bernard K. and Ross, Steven J.
|
||
|
||
TITLE: Audit and Control Systems Programming
|
||
Activities
|
||
ORGANIZATION: Institute of Internal Auditors
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Institute of Internal Auditors
|
||
LOCATION OF PUBLISHER: Altamonte Springs, FL
|
||
PUBLICATION DATE: 1985
|
||
CATEGORY: Audit and Evaluation
|
||
COST: $33.00
|
||
DESCRIPTION: This books describes techniques that
|
||
can be used to audit the activities of systems
|
||
programmers. A composite profile is included of
|
||
what constitutes good systems programming activity.
|
||
|
||
|
||
AUTHOR: Rothberg, Gabriel B.
|
||
|
||
TITLE: Structured EDP Auditing
|
||
|
||
ORGANIZATION: Institute of Internal Auditors
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Lifetime Learning Publications
|
||
LOCATION OF PUBLISHER: Altamonte Springs, FL
|
||
PUBLICATION DATE: 1983
|
||
CATEGORY: Audit and Evaluation
|
||
COST: $33.95
|
||
DESCRIPTION: This book shows how to go about
|
||
reviewing and establishing an EDP audit function.
|
||
Also included is how to define a DP environment
|
||
and identify its problems.
|
||
|
||
|
||
|
||
AUTHOR: Wood, Charles, Banks, William, Garcia, Abel
|
||
Guarro, Sergio, Hampel, Viktor, Sartorio, Henry
|
||
TITLE: Computer Security: A Comprehensive
|
||
Controls Checklist
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: John Wiley & Sons
|
||
LOCATION OF PUBLISHER: Somerset, NJ
|
||
PUBLICATION DATE: 1987
|
||
CATEGORY: Audit and Evaluation
|
||
COST: 56.95
|
||
DESCRIPTION: This books provides computer security
|
||
procedures and related checklists. It is designed
|
||
to assist in determining the integrity of security
|
||
controls.
|
||
|
||
|
||
CONTINGENCY PLANNING
|
||
|
||
AUTHOR: The Chantico Series
|
||
|
||
TITLE: Disaster Recovery: Contingency Planning
|
||
and Program Evaluation
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Q.E.D. Information Sciences
|
||
LOCATION OF PUBLISHER: Wellesley, MA
|
||
PUBLICATION DATE: 1985
|
||
CATEGORY: Contingency Planning
|
||
COST: $24.95
|
||
DESCRIPTION: This book discusses the phases of a
|
||
disaster recovery program including establishing
|
||
requirements, conducting the review program, and
|
||
evaluating the disaster recovery program.
|
||
|
||
|
||
DATA BASE MANAGEMENT
|
||
|
||
AUTHOR: Fernandex, E.B., Summers, R.C., and
|
||
Wood, C.
|
||
TITLE: The Systems Programming Series Database
|
||
Security and Integrity
|
||
ORGANIZATION:
|
||
VOLUME NO: 14467
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Addison-Wesley Publishers
|
||
LOCATION OF PUBLISHER: Reading, MA
|
||
PUBLICATION DATE: 1981
|
||
CATEGORY: Data Base Security
|
||
COST: $20.95
|
||
DESCRIPTION: This book is concerned with the
|
||
security and integrity of information that is
|
||
maintained in data bases.
|
||
|
||
|
||
GENERAL SECURITY
|
||
|
||
AUTHOR: Bosworth, Bruce
|
||
|
||
TITLE: Codes, Ciphers, And Computers
|
||
An Introduction to Information Security
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Hayden Book Company, Inc.
|
||
LOCATION OF PUBLISHER: New York
|
||
PUBLICATION DATE: 1983
|
||
CATEGORY: General Security
|
||
COST: $14.95
|
||
DESCRIPTION: This book presents the fundamentals
|
||
of traditional and modern cryptographic techniques.
|
||
It also provides modern techniques for the highest
|
||
levels of security for data and information.
|
||
|
||
|
||
AUTHOR: Buck, Edward
|
||
|
||
TITLE: Introduction to Data Security & Controls
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Q.E.D. Information Sciences
|
||
LOCATION OF PUBLISHER: Wellesley, MA
|
||
PUBLICATION DATE: 1982
|
||
CATEGORY: General Security
|
||
COST: $24.95
|
||
DESCRIPTION: This book presents the general context
|
||
of data security, including the need for security
|
||
and the reasons earlier approaches are no
|
||
longer sufficient. It also gives new methods for
|
||
dealing with data security.
|
||
|
||
|
||
AUTHOR: Carroll, John M.
|
||
|
||
TITLE: Computer Security
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: Second
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: 1987
|
||
CATEGORY: General Security
|
||
COST: $32.95
|
||
DESCRIPTION: This book is divided into six sections
|
||
covering threats, security management
|
||
considerations, physical security, communications
|
||
security, system security, and threat evaluation.
|
||
|
||
|
||
|
||
AUTHOR: Chantico Technical Management Series
|
||
|
||
TITLE: Security Evaluation For Small Computer
|
||
Centers
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Q.E.D. Information Sciences
|
||
LOCATION OF PUBLISHER: Wellesley, MA
|
||
PUBLICATION DATE: 1985
|
||
CATEGORY: General Security
|
||
COST: $24.95
|
||
DESCRIPTION: This book is concerned with the
|
||
activities required to review and evaluate the
|
||
security of small computer centers. It presents all
|
||
the major elements to be considered in a review.
|
||
|
||
|
||
AUTHOR: Cooper, James Arlin
|
||
|
||
TITLE: Computer Security Technology
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Lexington Books
|
||
LOCATION OF PUBLISHER: Lexington, MA
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: General Security
|
||
COST: $35.00
|
||
DESCRIPTION:
|
||
|
||
|
||
AUTHOR: Gallery, Shari Mendelson, ed.
|
||
|
||
TITLE: Computer Security: Readings from
|
||
"Security Management" Magazine
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: 1987
|
||
CATEGORY: General Security
|
||
COST: $24.95
|
||
DESCRIPTION: An assortment of readings concerning
|
||
a wide variety of computer security areas from
|
||
"Security Management" magazine.
|
||
|
||
|
||
AUTHOR: Fisher, Royal P.
|
||
|
||
TITLE: Information Systems Security
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Prentice-Hall, Inc.
|
||
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: General Security
|
||
COST: $24.95
|
||
DESCRIPTION: This book not only focuses on the role
|
||
of management in computer security, but it also
|
||
looks at practical ways of strengthening security
|
||
in information systems.
|
||
|
||
|
||
|
||
AUTHOR: Landreth, Bill
|
||
|
||
TITLE: Out of The Inner Circle
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Microsoft Press
|
||
LOCATION OF PUBLISHER: Bellevue, Washington
|
||
PUBLICATION DATE: 1985
|
||
CATEGORY: General Security
|
||
COST: $9.95
|
||
DESCRIPTION: This book examines a wide variety of
|
||
computer hackers' approaches and techniques.
|
||
Provides a security checklist identifying the
|
||
security loopholes exploited by hackers today.
|
||
|
||
|
||
AUTHOR: Leiss, Ernst L.
|
||
|
||
TITLE: Principles of Data Security
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Plenum Press
|
||
LOCATION OF PUBLISHER: New York, NY
|
||
PUBLICATION DATE: 1982
|
||
CATEGORY: General Security
|
||
COST: $32.50 plus $1.50 for shipping.
|
||
DESCRIPTION: This book presents a comprehensive
|
||
study of security for computers and their data
|
||
bases. Authorization mechanisms and cryptography
|
||
systems are explained in detail.
|
||
|
||
|
||
AUTHOR: Martin, James
|
||
|
||
TITLE: Security, Accuracy, And Privacy In
|
||
Computer Systems
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Prentice-Hall, Inc.
|
||
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
||
PUBLICATION DATE: 1973
|
||
CATEGORY: General Security
|
||
COST: $65.00
|
||
DESCRIPTION: This book provides a codification of
|
||
information on computer accuracy, security, and
|
||
privacy.
|
||
|
||
|
||
AUTHOR: Norman, Adrien
|
||
|
||
TITLE: Computer Insecurity
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Methuen, Inc.
|
||
LOCATION OF PUBLISHER: New York, NY
|
||
PUBLICATION DATE: 1985
|
||
CATEGORY: General Security
|
||
COST: $16.95
|
||
DESCRIPTION: This book presents actual cases of
|
||
computer security breaches.
|
||
|
||
|
||
AUTHOR: Schweitzer, James A.
|
||
|
||
TITLE: Computers, Business, and Security: The
|
||
New Role for Security
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: 1987
|
||
CATEGORY: General Security
|
||
COST: $24.95
|
||
DESCRIPTION: This book covers the essentials of
|
||
establishing a secure work environment including
|
||
implementing a security program.
|
||
|
||
|
||
AUTHOR: Turn, Rein, ed.
|
||
|
||
TITLE: Advances in Computer Systems Security
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Artech House, Inc.
|
||
LOCATION OF PUBLISHER: Dedham, MA
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: General Security
|
||
COST: $44.00
|
||
DESCRIPTION: This book contains a variety of
|
||
articles and technical papers that discuss
|
||
some aspect of computer security.
|
||
|
||
|
||
AUTHOR: Wood, Michael B.
|
||
|
||
TITLE: Introducing Computer Security
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: John Wiley and Sons, Inc.
|
||
LOCATION OF PUBLISHER: Somerset, NJ
|
||
PUBLICATION DATE: 1982
|
||
CATEGORY: General Security
|
||
COST: $18.60
|
||
DESCRIPTION: This book stresses that an effective
|
||
security program needs to be incorporated into an
|
||
organization. Written with the non-specialist in
|
||
mind, it covers both intentional and accidental
|
||
threats, which can affect computer systems.
|
||
|
||
|
||
MICROCOMPUTER SECURITY
|
||
|
||
|
||
AUTHOR: Carroll, John M.
|
||
|
||
TITLE: Managing Risk: A Computer-Aided Strategy
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: Risk Management
|
||
COST: $24.95
|
||
DESCRIPTION: This book is a "how to" manual on
|
||
quantifing risk management using your computer
|
||
as an active tool in accessing and reducing loss.
|
||
|
||
|
||
AUTHOR: Cronin, Daniel J.
|
||
|
||
TITLE: Microcomputer Data Security: Issues and
|
||
Strategies
|
||
ORGANIZATION:
|
||
ORDER NO: ISBN 0-89303-672-2
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Prentice Hall, Inc.
|
||
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
||
PUBLICATION DATE: 1986
|
||
CATEGORY: Microcomputer Security
|
||
COST: $18.95 plus $1.50 shipping & handling
|
||
DESCRIPTION: This book examines the microcomputer
|
||
and offers a variety of practical solutions to
|
||
both hardware and software integrity problems.
|
||
Deals mainly with IBM and IBM-compatible systems.
|
||
|
||
|
||
AUTHOR: Hansen, James V. and Romney, Marshell B.
|
||
|
||
TITLE: An Introduction to Microcomputers and
|
||
Their Controls
|
||
ORGANIZATION: Institute of Internal Auditors
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Institute of Internal Auditors
|
||
LOCATION OF PUBLISHER: Altamonte Springs, FL
|
||
PUBLICATION DATE: 1985
|
||
CATEGORY: Microcomputer Security
|
||
COST: $33.00
|
||
DESCRIPTION: This book covers the unique problems
|
||
that will be found on individual systems and the
|
||
control strategies to correct these problems. The
|
||
subjects include principles of control and
|
||
security, risks and potential losses, and implemen-
|
||
tation of actions.
|
||
|
||
|
||
AUTHOR: Highland, Harold Joseph
|
||
|
||
TITLE: Protecting Your Microcomputer System
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: John Wiley & Sons, Inc.
|
||
LOCATION OF PUBLISHER: Somerset, NJ
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: Microcomputer Security
|
||
COST: $14.95 plus local sales tax.
|
||
DESCRIPTION: This book identifies the risks that
|
||
can destroy a microcomputer system and shows how
|
||
to safeguard the computer from a variety of hazards
|
||
that threaten the system.
|
||
|
||
|
||
RISK MANAGEMENT
|
||
|
||
|
||
AUTHOR: Broder, James F.
|
||
|
||
TITLE: Risk Analysis And The Security Survey
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: 1984
|
||
CATEGORY: Risk Management
|
||
COST: $26.95
|
||
DESCRIPTION: This book shows where security
|
||
allocations may be inadequate, or where resources
|
||
may be wasted, and how to apply the practical
|
||
concepts of risk analysis.
|
||
|
||
SECURITY MANAGEMENT
|
||
|
||
|
||
AUTHOR: Parker, Donn B.
|
||
|
||
TITLE: Computer Security Management
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Prentice Hall Publisher
|
||
LOCATION OF PUBLISHER: Englewood Cliffs, NJ
|
||
PUBLICATION DATE: 1981
|
||
CATEGORY: Security Management
|
||
COST: $40.00
|
||
DESCRIPTION: A basic text on problems, concepts,
|
||
theories, and practices in the management of
|
||
computer security.
|
||
|
||
|
||
AUTHOR: Schweitzer, James A.
|
||
|
||
TITLE: Managing Information Security: A Program
|
||
for the Electronic Information Age
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Butterworth Publishers
|
||
LOCATION OF PUBLISHER: Stoneham, MA
|
||
PUBLICATION DATE: 1982
|
||
CATEGORY: Security Management
|
||
COST: $26.95
|
||
DESCRIPTION: This book surveys the information
|
||
processing environment and offers proven, tested
|
||
approaches to effectively safeguard vital
|
||
electronic information.
|
||
|
||
|
||
AUTHOR: Schweitzer, James A.
|
||
|
||
TITLE: Protecting Information in the Electronic
|
||
Workplace: A Guide for Managers
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Reston Publishers
|
||
LOCATION OF PUBLISHER: Reston, VA
|
||
PUBLICATION DATE: 1983
|
||
CATEGORY: Security Management
|
||
COST: $36.00
|
||
DESCRIPTION: This book gives a structure for
|
||
information security. It discusses the protection
|
||
of personal workstations, cases of fraud, and
|
||
examples of applying security in the computer
|
||
environment.
|
||
|
||
|
||
AUTHOR: Talbot, J.R.
|
||
|
||
TITLE: Management Guide to Computer Security
|
||
|
||
ORGANIZATION:
|
||
VOLUME NO:
|
||
EDITION NO: First
|
||
NAME OF PUBLISHER: Gower Publishing Co., LTD.
|
||
LOCATION OF PUBLISHER: Brookfield, VT
|
||
PUBLICATION DATE: 1981
|
||
CATEGORY: Security Management
|
||
COST: $36.95
|
||
DESCRIPTION: This book describes a wide range of
|
||
computer security considerations a manager might
|
||
want to keep in mind. Risks to installations and
|
||
steps to prevent damage to computers are covered.
|
||
|