What people are saying - Write a review
We haven't found any reviews in the usual places.
TWO Establishing Computer Security
THREE Physical Security
7 other sections not shown
Access Control accounts applications audit backup batch totals Bruchhausen Change Control computer crime computer fraud computer network computer operations computer room computer security computer security policy computer system costs curity data and information data base data processing Detection and Countermeasures deterrence devices disaster recovery plan DP employees DP facility DP manager DP operations DP staff Eclipse computer EDP auditor EDP insurance policy effective EFLIC electronic Electronic Data Systems embezzlement encryption end product ensure equipment evaluation files Goldblum high technology human factor implementation input Intruder Detection know-how loss Maluta manual ment password person personnel security policies and standards possible Potential Perpetrators procedures public key puter security RACF record Rifkin risk analysis sabotage security measures security policy sensitive data Slear Slyngsted SZ ZT terminal theft tion top management transactions unauthorized uninterruptible power supply updating verify wire transfer ZT ZZ ZZ SZ