Computers at Risk
Safe Computing in the Information Age
Seiten
1990
National Academies Press (Verlag)
978-0-309-07481-0 (ISBN)
National Academies Press (Verlag)
978-0-309-07481-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Presents an agenda for developing policies and practices for computer security. Recommendations are provided for industry and government agencies engaged in computer security activities. This volume outlines problems and opportunities in research, recommends ways to improve the research infrastructure, and suggests topics for investigators.
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities.
The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators.
The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Table of Contents
Front Matter
Executive Summary
Overview and Recommendations
Concepts of Information Security
Technology to Achieve Secure Computer
Programming Methodology
Criteria to Evaluate Computer and Network Security
Why the Security Market Has Not Worked Well
The Need to Establish an Information Security Foundation
Research Topics and Funding
Bibliography
A The Orange Book
B Selected Topics in Computer Security Technology
C Emergency Response Teams
D Models for GSSP
E High-grade Threats
F Glossary
G List of Members of the Former Commission on Physical Sciences, Mathematics, and Resources
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities.
The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators.
The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Table of Contents
Front Matter
Executive Summary
Overview and Recommendations
Concepts of Information Security
Technology to Achieve Secure Computer
Programming Methodology
Criteria to Evaluate Computer and Network Security
Why the Security Market Has Not Worked Well
The Need to Establish an Information Security Foundation
Research Topics and Funding
Bibliography
A The Orange Book
B Selected Topics in Computer Security Technology
C Emergency Response Teams
D Models for GSSP
E High-grade Threats
F Glossary
G List of Members of the Former Commission on Physical Sciences, Mathematics, and Resources
System Security Study Committee, Commission on Physical Sciences, Mathematics, and Applications, National Research Council
Verlagsort | Washington |
---|---|
Sprache | englisch |
Maße | 152 x 229 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-309-07481-9 / 0309074819 |
ISBN-13 | 978-0-309-07481-0 / 9780309074810 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €