Trade in Yours
For a 0.25 Gift Card
Trade in
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Tell the Publisher!
Id like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Computer Security Handbook [Paperback]

Arthur E. Hutt , Seymour Bosworth , Douglas B. Hoyt


Available from these sellers.


Formats

Amazon Price New from Used from
Hardcover --  
Paperback --  
Trade In this Item for up to 0.25
Trade in Computer Security Handbook for an Amazon Gift Card of up to 0.25, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more
There is a newer edition of this item:
Computer Security Handbook, Set Computer Security Handbook, Set
109.54
In stock.

Book Description

30 Oct 1995 0471118540 978-0471118541 3rd Edition
Computer viruses, power outages, theft, and sabotage have sent even the largest companies reeling

Not a day goes by when we don′t hear news of another computer disaster. Loss of irreplaceable data, theft of confidential files, destruction of millions of dollars worth of equipment and software—all the result of crime or accident. Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company′s computer system and its contents. The Computer Security Handbook shows you how to detect threats and prevent disaster from striking. Written by leading security experts, this comprehensive guide covers virtually every possible threat to your system and prescribes specific actions you can take to eliminate them.

Requiring minimal technical knowledge, Computer Security Handbook provides sound, tested information on hardware and software protection, computer viruses, data encryption, networks, risk management, contingency planning and much more. Each chapter concludes with a checklist summarizing the authors′ recommendations for improving your organization′s security status. The new, updated Third Edition features the latest information on viruses, LAN security, security on the Internet, and expanded coverage of system application controls, personal computers, and data communications.

Computer Security Handbook is must reading for EDP auditors, MIS/IT managers, corporate accountants, data processing professionals, and others concerned with the security of their electronic information resources.


Product details


More About the Authors

Discover books, learn about writers, and more.

Product Description

From the Back Cover

Computer viruses, power outages, theft, and sabotage have sent even the largest companies reeling

Not a day goes by when we don′t hear news of another computer disaster. Loss of irreplaceable data, theft of confidential files, destruction of millions of dollars worth of equipment and software—all the result of crime or accident. Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company′s computer system and its contents. The Computer Security Handbook shows you how to detect threats and prevent disaster from striking. Written by leading security experts, this comprehensive guide covers virtually every possible threat to your system and prescribes specific actions you can take to eliminate them.

Requiring minimal technical knowledge, Computer Security Handbook provides sound, tested information on hardware and software protection, computer viruses, data encryption, networks, risk management, contingency planning and much more. Each chapter concludes with a checklist summarizing the authors′ recommendations for improving your organization′s security status. The new, updated Third Edition features the latest information on viruses, LAN security, security on the Internet, and expanded coverage of system application controls, personal computers, and data communications.

Computer Security Handbook is must reading for EDP auditors, MIS/IT managers, corporate accountants, data processing professionals, and others concerned with the security of their electronic information resources.

About the Author

ARTHUR E. HUTT is an information systems consultant with extensive experience in the uses of data processing in banking, government, and industry. He has served as senior information systems executive for the Bank Leumi Trust Company and The Bowery Savings Bank. He was coeditor and contributing author of Computer Handbook for Senior Management, published by Wiley, and has contributed to numerous professional publications.

SEYMOUR BOSWORTH is president of S. Bosworth & Associates, a management consulting firm active in computer applications for banking, commerce, and industry. Mr. Bosworth is adjunct Associate professor of management at the Information Technologies Institute of New York University and a contributor to technical journals.

DOUGLAS B. HOYT is president of Douglas B. Hoyt Co., a management consulting firm. He is past president of the Society of Professional Management Consultants and recipient of the Distinguished Service Award of the Association for Systems Management. Mr. Hoyt was also coeditor of Computer Handbook for Senior Management (Wiley).


Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

There are no customer reviews yet on Amazon.co.uk.
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  1 review
34 of 37 people found the following review helpful
5.0 out of 5 stars A "must have" for InfoSec newbies and professionals. 30 April 1999
By jfullert@csdept.keene.edu - Published on Amazon.com
Format:Paperback
This book makes an excellent addition to anyone in the field of information security. It is very thorough in content, discussing computer security from many angles based on four principles: Integrity, Availability, Control and Auditability. Not for the light reader, but makes a great reference, and an excellent basis for creating a solid security design. I've often heard this book referred to as "big blue". Must have.
Was this review helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback