21 pages matching device in this book
Results 1-3 of 21
What people are saying - Write a review
LibraryThing ReviewUser Review - LibraryThing
Obsoleting the common three elements of security, confidentiality, integrity, and availability, the fundamentals of his new framework of information security are availability, utility, integrity, authenticity, confidentiality, and possession. He debunks a number of the tenets of computer security claiming early on that there are “no valid statistics on computer crime,” stressing that information security “can never be a science,” and warning that “starting with vulnerabilities is starting in the middle.” He’s quite harsh in his indictment of numeric and financial threat analysis, claiming that “adopting baseline controls is a simpler, less expensive, and more effective way to select security safeguards than risk assessment.” Parker has a very business-oriented and pragmatic approach to security, and tries to suggest ways that security can help meet business goals instead of conflicting with them. This is a great book, and I highly recommend it. Readers should not be put off by its date, because it is not about technology, it is about people and making optimal decisions about managing IT and information security-related risks. Many of the counter-productive practices that Parker warns about, gained thru over 3 decades of his experience, continue to plague today's practitioner.
Review: Fighting Computer Crime: A New Framework for Protecting InformationUser Review - Goodreads
I think this is no longer a "new" framework but still a valid insight into information security. One pause I took with this book is the author's complete aversion to information security risk ...
PART ONE Computer Abase 1
Computer Abuse Research
How Much Computer Crime Is There?
44 other sections not shown
Morality and Machines: Perspectives on Computer Ethics
Stacey L. Edgar
No preview available - 2002
E-Business Privacy and Trust: Planning and Management Strategies
Limited preview - 2002
Computer Crime Dictionary
Parker, Donn D. (1998) Fighting Computer Crime: A New Framework for Protecting Information. Wiley. Cybercrime: "Crime in which the perpetuator uses special ...
www.ed.uiuc.edu/ wp/ crime/ computer_crime_dictionary.htm
The Dark Side of Computing: SRI International and the Study of ...
 db Parker, Fighting Computer Crime, Charles Scribner's Sons, 1983.  The Mafia at one time became interested in our studies, and an FBI agent urged me ...
csdl2.computer.org/ persagen/ DLAbsToc.jsp?resourcePath=/ dl/ mags/ an/ &
Fighting Computer Crime - Boek - BESLIST.nl
Bekijk en vergelijk informatie, beoordelingen, vragen & antwoorden en de beste winkels voor 'Fighting Computer Crime' op BESLIST.nl ▪ Boeken Engels ...
boeken_engels.beslist.nl/ boeken_engels/ d0000818878/ Fighting_Computer_Crime.html
linuxbookreviewssecuritybooks < Main < twiki
<Fighting Computer Crime> *Fighting Computer Crime, a new framework for Protecting Information* by Donn B. Parker. Published by John Wiley and Sons, ...
www.penlug.org/ twiki/ bin/ view/ Main/ LinuxBookReviewsSecurityBooks?raw=on
Anonymity in Cyberspace: Finding the Balance
D. PARKER, Fighting Computer Crime (ny, Wiley), . 7. E.BERNARD, The Collapse of the Harm Principle, 90 (J. CRIM. L. &Criminology) 109, 120-39 . ...
www.crime-research.org/ articles/ 2110/ 5
FIGHTING COMPUTER CRIME - Parker - Comprar-livro.com.br
FIGHTING COMPUTER CRIME - Parker. ... Índice: Home / P / Parker / Fighting Computer Crime /. Fighting Computer Crime - Parker (0471163783) ...
parker.comprar-livro.com.br/ livros/ 1047116378/
The Top Five Computer Crime - The Top Five Computer Crime Fighting Computer Crime: A New Framework for Protecting Information by Donn Parker, ...
Studies and Surveys of Computer Crime
chapters of his book, Fighting Computer Crime: A New Framework for Protecting Information. (1998). Chapter 6 of that book is called, “Cyberspace Abusers and ...
www.securitystats.com/ reports/ Studies_and_Surveys_of_Computer_Crime.pdf
Cairn - International computer crimes
 P. TAYLOR, THE HAWKS AND THE DOVES — ENEMIES AND FRIENDS (Routledge 1999); DONN B. PARKER, FIGHTING COMPUTER CRIME : A NEW FRAMEWORK FOR PROTECTING ...
Information Security at the University of Georgia - Enterprise IT ...
Fighting Computer Crime: A New Framework for Protecting Information Donn B. Parker, CISSP John Wiley &Sons ISBN: 0471163783 Available from amazon.com ...
www.infosec.uga.edu/ ciso/ bookshelf.php