What people are saying - Write a review
We haven't found any reviews in the usual places.
Synchronous and Selfsynchronous
18 other sections not shown
access control activities ADP system analysis application assets attack audit automated Automated Information System backup Chapter ciphertext classification communications computer abuse computer crime computer programs Computer Security computer system computer virus confidential cost covert channel criminal Cryptography data processing database DBMS defined disclosure disk diskette documents employees enciphered encryption ensure evaluation example exposure files FIPS PUB 39 formal functions guidelines hardware HPS PUB 39 identified implementation individual information security information systems security integrity involved magnetic mainframe methods microcomputers minicomputer operating system organization password penetration person personal computer personnel physical problems procedures protection requirements responsibility risk security and control security policy security professional sensitive separation of duties specific standards storage stream cipher TCSEC termination threats tion Trojan Horse Trusted computing base unauthorized virus vulnerability