Overview
- Covers a more comprehensive range of subjects than other available texts (including management of security and personnel security)
- More up-to-date than other books, including implications which arose from the Y2K date change
Part of the book series: Computer Communications and Networks (CCN)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (16 chapters)
Keywords
About this book
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.
Authors and Affiliations
Bibliographic Information
Book Title: An Information Security Handbook
Authors: John M. D. Hunter
Series Title: Computer Communications and Networks
DOI: https://doi.org/10.1007/978-1-4471-0261-8
Publisher: Springer London
-
eBook Packages: Springer Book Archive
Copyright Information: Springer-Verlag London 2001
Softcover ISBN: 978-1-85233-180-1Published: 16 March 2001
eBook ISBN: 978-1-4471-0261-8Published: 06 December 2012
Series ISSN: 1617-7975
Series E-ISSN: 2197-8433
Edition Number: 1
Number of Pages: XIV, 226
Number of Illustrations: 3 b/w illustrations
Topics: Cryptology, Computer Communication Networks, Information Systems and Communication Service, Procurement