Computer Security Reference Book
Butterworth-Heinemann, 1992 - Computer crimes - 949 pages
This comprehensive reference book provides an in-depth treatment of the whole field including: computing-crime; data protection; EFTPOS schemes; evaluation of security products; hacking; public key cryptography; risk analysis; telecommunications; unix and security; viruses; as well as many other important and topical aspects of computer security.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Identity Verification and Biometrics
45 other sections not shown
Other editions - View all
access control algorithm application assets attack authentication automated backup banking biometric block cipher Chapter cipher ciphertext communications computer crime computer security computer system copy cost criminal cryptographic damage data processing data protection defined detection digital signatures document electronic employees encipherment encryption environment equipment example facilities files floppy disk formal methods fraud function hackers hard disk hardware identify implementation installation Insured integrity involved key management logic bomb loss machine magnetic stripe card microcomputer operating system organization password perpetrators personal computers personal data physical plaintext possible potential problem procedures public key risk analysis security countermeasures security policy smart card specific staff standard storage stored tape techniques terminal testing threat sources token transaction Trojan horse unauthorized verification virus viruses vulnerabilities