Coverart for item
The Resource The international handbook of computer security, Jae K. Shim [and others]

The international handbook of computer security, Jae K. Shim [and others]

Label
The international handbook of computer security
Title
The international handbook of computer security
Statement of responsibility
Jae K. Shim [and others]
Creator
Contributor
Subject
Genre
Language
eng
Summary
The international handbook of computer security is written primarily to help business executives and information systems/computer professionals protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in the quagmire of computers, technology, networks, and software. Among the major topics discussed are : company security policies, data preservation and protection, personnel management and security, legal and auditing planning and control, network security, internal and external systems, physical security procedures, hardware and software protection, contingency planning
Cataloging source
N$T
http://library.link/vocab/creatorName
Shim, Jae K
Dewey number
005.8
Index
index present
LC call number
QA76.9
LC item number
.S55 2000eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
  • handbooks
http://library.link/vocab/relatedWorkOrContributorName
  • Shim, Jae K
  • Qureshi, Anique A
  • Siegel, Joel G
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Internet
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer networks
  • Computer security
  • Internet
  • Engineering & Applied Sciences
  • Computer Science
  • SEGURANÇA EM COMPUTADOR
  • REDES DE COMPUTADORES
Label
The international handbook of computer security, Jae K. Shim [and others]
Instantiates
Publication
Note
Includes index
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • 33
  • Chapter 4
  • Software Security
  • 67
  • Chapter 5
  • Personnel Security
  • 109
  • Chapter 6
  • Network Security
  • 117
  • Chapter 1
  • Appendix 6.A
  • Commercial Firewalls
  • 145
  • Appendix 6.B
  • Firewall Resellers
  • 153
  • Appendix 6.C
  • Public Domain, Shareware, etc.
  • 163
  • Chapter 7
  • Organizational Policy
  • Security Policy
  • 165
  • Appendix 7.A
  • Sources of Information Security Policies
  • 178
  • Appendix 7.B
  • Sample Computer Policy
  • 179
  • Chapter 8
  • Contingency Planning
  • 1
  • 191
  • Appendix 8.A
  • Business Impact Analysis Worksheet
  • 213
  • Appendix 8.B
  • Communications Assessment Questionnaire
  • 215
  • Appendix 8.C
  • Insurance Recovery Program
  • 217
  • Chapter 2
  • Appendix 8.D
  • Making an Insurance Claim
  • 219
  • Chapter 9
  • Auditing and Legal Issues
  • 221
  • Appendix
  • Security Software
  • 235
  • Physical Security and Data Preservation
  • 11
  • Chapter 3
  • Hardware Security
Control code
45843766
Dimensions
unknown
Extent
1 online resource (xii, 260 pages)
Form of item
online
Isbn
9780814424551
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
(OCoLC)45843766
Label
The international handbook of computer security, Jae K. Shim [and others]
Publication
Note
Includes index
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • 33
  • Chapter 4
  • Software Security
  • 67
  • Chapter 5
  • Personnel Security
  • 109
  • Chapter 6
  • Network Security
  • 117
  • Chapter 1
  • Appendix 6.A
  • Commercial Firewalls
  • 145
  • Appendix 6.B
  • Firewall Resellers
  • 153
  • Appendix 6.C
  • Public Domain, Shareware, etc.
  • 163
  • Chapter 7
  • Organizational Policy
  • Security Policy
  • 165
  • Appendix 7.A
  • Sources of Information Security Policies
  • 178
  • Appendix 7.B
  • Sample Computer Policy
  • 179
  • Chapter 8
  • Contingency Planning
  • 1
  • 191
  • Appendix 8.A
  • Business Impact Analysis Worksheet
  • 213
  • Appendix 8.B
  • Communications Assessment Questionnaire
  • 215
  • Appendix 8.C
  • Insurance Recovery Program
  • 217
  • Chapter 2
  • Appendix 8.D
  • Making an Insurance Claim
  • 219
  • Chapter 9
  • Auditing and Legal Issues
  • 221
  • Appendix
  • Security Software
  • 235
  • Physical Security and Data Preservation
  • 11
  • Chapter 3
  • Hardware Security
Control code
45843766
Dimensions
unknown
Extent
1 online resource (xii, 260 pages)
Form of item
online
Isbn
9780814424551
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
(OCoLC)45843766

Library Locations

    • UMKCBorrow it
      800 E 51st St, Kansas City, MO, 64110, US
      39.035061 -94.576518
    • Health Sciences LibraryBorrow it
      2411 Holmes St, Kansas City, Kansas City, MO, 64108, US
      39.083418 -94.575323
    • Leon E. Bloch Law LibraryBorrow it
      500 E. 52nd Street, Kansas City, MO, 64110, US
      39.032488 -94.581967
Processing Feedback ...