Skip to main content
  • Textbook
  • © 2001

An Information Security Handbook

Authors:

  • Covers a more comprehensive range of subjects than other available texts (including management of security and personnel security)
  • More up-to-date than other books, including implications which arose from the Y2K date change

Part of the book series: Computer Communications and Networks (CCN)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 chapters)

  1. Front Matter

    Pages i-xiv
  2. Introduction

    • John M. D. Hunter
    Pages 1-10
  3. Technology and Security

    • John M. D. Hunter
    Pages 11-28
  4. Physical Security

    • John M. D. Hunter
    Pages 29-34
  5. Personnel Security

    • John M. D. Hunter
    Pages 35-40
  6. Communications Security

    • John M. D. Hunter
    Pages 41-62
  7. Unix Security

    • John M. D. Hunter
    Pages 63-75
  8. Internet Security

    • John M. D. Hunter
    Pages 77-81
  9. Radiation Security

    • John M. D. Hunter
    Pages 83-86
  10. Procedural Security

    • John M. D. Hunter
    Pages 87-96
  11. Software Security

    • John M. D. Hunter
    Pages 97-104
  12. Some Notes on Static Analysis

    • John M. D. Hunter
    Pages 105-114
  13. Computer Viruses

    • John M. D. Hunter
    Pages 115-133
  14. The UK Data Protection Acts

    • John M. D. Hunter
    Pages 135-139
  15. System Administration and Security

    • John M. D. Hunter
    Pages 141-152
  16. The Management of Security

    • John M. D. Hunter
    Pages 153-157
  17. Conclusions

    • John M. D. Hunter
    Pages 159-161
  18. Back Matter

    Pages 163-226

About this book

Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in employing security techniques (availability, integrity, confidentiality, exclusivity) and which technique is best suited to achieving each goal. With guidelines appropriate for the protection of both conventional commercial and military systems, An Information Security Handbook will be of interest to computer system managers and administrators in any commercial or government organisation.

Authors and Affiliations

  • CISM Group, Cranfield University, RMCS, Shrivenham, Swindon, UK

    John M. D. Hunter

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access