By Barbara Guttman

Show description

Read or Download An Introduction to Computer Security: The NIST Handbook PDF

Best computers books

CAAP '90: 15th Colloquium on Trees in Algebra and Programming Copenhagen, Denmark, May 15–18, 1990 Proceedings

This quantity comprises the court cases of the 15th Colloquium on timber in Algebra and Programming. The papers chosen current new learn effects and canopy the next subject matters: - Logical, algebraic and combinatorial houses of discrete constructions (strings, timber, graphs, and so forth. ), together with the speculation of formal languages regarded as that of units of discrete buildings and the idea of rewriting platforms over those items.

Performance Evaluation: Origins and Directions

This monograph-like state of the art survey offers the historical past, the most important principles, the luck tales, and destiny demanding situations of functionality overview and demonstrates the effect of functionality overview on various diverse components via case stories in a coherent and finished method. top researchers within the box have contributed 19 cross-reviewed topical chapters effectively protecting the entire diversity of functionality overview, from theoretical and methodological concerns to functions in different different fields.

Developing Enterprise Java Applications with J2EE(TM) and UML

This ebook has an excellent bankruptcy four on UML-Java mapping that's defined very truly. different books has a tendency to be bombastic and theorectical and vomitting out dry, lifeless excessive point UML jargons. for the reason that such a lot builders understands attrbutes and strategies larger than say, attempting to work out what an organization hyperlink is, the pointed out bankruptcy is worthy.

Additional resources for An Introduction to Computer Security: The NIST Handbook

Example text

However, even the most sophisticated programs cannot detect all types of input errors or omissions. A sound awareness and training program can help an organization reduce the number and severity of errors and omissions. Users, data entry clerks, system operators, and programmers frequently make errors that contribute directly or indirectly to security problems. In some cases, the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, the errors create vulnerabilities.

Pp. 104-120. Sterne, D. F. '" In Proceedings of the 1991 IEEE Symposium on Security and Privacy, Oakland, CA: May 1991. pp. 219-230. Wood, Charles Cresson. " DATAPRO Reports on Information Security, April 1992. 56 It therefore makes sense that executives view computer security as a management issue and seek to protect their organization's computer resources as they would any other valuable asset. To do this effectively requires developing of a comprehensive management approach. 57 Because agencies establish computer security programs.

42 During the investigation, auditors learned that SSA employees had unrestricted access to over 130 million employment records. 43 Some of the employees used the information to create fraudulent tax refunds, but many were acting simply out of curiosity. As more of these cases come to light, many individuals are becoming increasingly concerned about threats to their personal privacy. , 24 September 1992, Serial 102-131. 43 Stephen Barr, "Probe Finds IRS Workers Were `Browsing' in Files," The Washington Post, 3 August 1993, p.

Download PDF sample

Rated 4.62 of 5 – based on 23 votes