search for books and compare prices
Tables of Contents for Computer Security Handbook
Chapter/Section Title
Page #
Page Count
PART ONE: MANAGEMENT'S RESPONSIBILITY
Management's Role in Computer Security
Arthur E. Hutt
Policies, Standards, and Procedures
Noel K. Zakin
Information Security Risk Management
John M. Carroll
Employment Policies and Practices
Robert W. London
Legal Issues in Computer Security
Robert P. Bigelow
Computer Crime and Computer Criminals
G. Jack Bologna
PART TWO: BASIC SAFEGUARDS
Contingency Planning and Disaster Recovery
Arthur E. Hutt
Computer Risks and Insurance
Johnson
Higgins
Auditing Computer Security
Diane E. Levine
System Application Controls
Timothy Braithwaite
PART THREE: PHYSICAL PROTECTION
Hardware Elements of Security
Seymour Bosworth
Computer Facility Protection
Franklin N. Platt
Monitoring and Related Control Devices
Eugene V. Redmond
PART FOUR: TECHNICAL PROTECTION
Software and Information Security
Myles E. Walsh
Security of Computer Data, Records, and Forms
Douglas B. Hoyt
Data Encryption
Diane E. Levine
Data Communications and Networking
Seymour Bosworth
Penetrating Computer Systems and Networks
M. E. Kabay
Viruses and Related Threats to Computer Security
Diane E. Levine
PART FIVE: SPECIAL PROTECTION ISSUES
Outside Services
Jack M. Durner
Security for Personal Computers
Jon R. David
Local Area Network Security
Diane E. Levine
Security on the Internet
Robert Gezelter
APPENDIXES
A1. Central Management of Distributed Systems
A2. Guide for Selecting Automated Risk Analysis Tools
Irene E. Gilbert
A3. Security Standards Manual: Table of Contents (Sample)
A4. Confidentiality Agreement (Sample)
A5. Admissibility of Computer Records
A6. Revenue Procedure 91-59: IRS Guidelines for ADP Records
A7. IRS Revenue Ruling 71-20: What Are Records?
A8. Confidential and Proprietary Information Agreement (Sample)
A9.The Hot-Site Solution: How Would You Maintain Critical Operations If Disaster Struck Your Site?
Daniel Kilburn
A10. Employee Nondisclosure Agreement (Sample)
A11. Computer Privacy in the United States
Robert P. Bigelow
A12. Selected Bibliography on Computer Crime
A13. Off-Site Record Storage Considerations
A14. Federal Information Processing Standards: Abstracts
A14(a). FIPS PUB 46-2: Data Encryption Standard
A14(b). FIPS PUB 180: Secure Hash Standard
A15. EDP Auditing and Related Packages
Diane E. Levine
A15(a). PC Self-Assessment
Ernst
Young
A15(b). SPA Self-Audit Kit (Excerpts) Software Publishers Association
A16. LAN Security Products
Diane E. Levine
A17. Model Framework for Management Control over Automated Information Systems (Excerpts)
A18. FFIEC EDP Examination Work Program
A19. FFIEC Examination Policies
A20. Minimum Security Functionality Requirements for Multiuser Operation Systems
A21. Automated Tools for Testing Computer Systems Vulnerability
W. Timothy Polk
A22. Virus Notes and Products
Diane E. Levine
A23. Threat Assessment of Malicious Code and Human Threats
Lawrence E. Bassham
W. Timothy Polk
A24. Internet Security and Risk Reduction
A25. UPS Systems: Technical Notes
A26. Data Encryption Products
Diane E. Levine
A27. Remote Access Computing
Tommy Ward
A28. Firewall Protection on the Internet
A29. End-User Computing
Glossary
Index