Practical Data Security

Author:   John Gordon
Publisher:   Taylor & Francis Ltd
ISBN:  

9781138330986


Pages:   164
Publication Date:   06 August 2018
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $200.00 Quantity:  
Add to Cart

Share |

Practical Data Security


Add your own review!

Overview

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Full Product Details

Author:   John Gordon
Publisher:   Taylor & Francis Ltd
Imprint:   Routledge
Weight:   0.453kg
ISBN:  

9781138330986


ISBN 10:   1138330981
Pages:   164
Publication Date:   06 August 2018
Audience:   College/higher education ,  General/trade ,  Tertiary & Higher Education ,  General
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

1. An Organisation for Security in a Major Company. Charles Brookson. 2. Information Technology Security Evaluation: Management Summary. Eric Roche. 3. Closing the Evaluation Gap – the CLEF Experience. Andrew Clark and Andrea Cumming. 4. Mechanisms of Stealth. Alan Solomon. 5. Computer Viruses. Jan Hruska. 6. Security Modelling. John Gordon. 7. Secure Delivery of Software. Fiona Williams and Samantha Green. 8. Digital Signatures for Non-Repudiation. Fred Piper. 9. Network Encryption Management. Vince Gallo. 10. Computer Crime: Law and Regulation – Protection and Prosecution. Wendy R. London. 11. A Structured Control Methodology to Aid Data Security. John Mitchell. 12. Securing Your PC. Alex Mcintosh.

Reviews

Author Information

John Gordon

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List