Warehouse Stock Clearance Sale

Grab a bargain today!


Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
Practical Data Security
Routledge Revivals
By John Gordon (Edited by)

Rating
Format
Paperback, 160 pages
Other Formats Available

Hardback : £86.96

Published
United Kingdom, 30 June 2020

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.


Our Price
£27.20
Elsewhere
£31.99
Save £4.79 (15%)
Ships from UK Estimated delivery date: 24th Apr - 28th Apr from UK

Buy Together
+
Buy together with Environment, Planning and Land Use at a great price!
Buy Together
£115.50
Elsewhere Price
£137.20
You Save £21.70 (16%)

Product Description

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Product Details
EAN
9781138331044
ISBN
113833104X
Publisher
Dimensions
23.4 x 15.6 centimeters (0.33 kg)

Table of Contents

1. An Organisation for Security in a Major Company. Charles Brookson. 2. Information Technology Security Evaluation: Management Summary. Eric Roche. 3. Closing the Evaluation Gap – the CLEF Experience. Andrew Clark and Andrea Cumming. 4. Mechanisms of Stealth. Alan Solomon. 5. Computer Viruses. Jan Hruska. 6. Security Modelling. John Gordon. 7. Secure Delivery of Software. Fiona Williams and Samantha Green. 8. Digital Signatures for Non-Repudiation. Fred Piper. 9. Network Encryption Management. Vince Gallo. 10. Computer Crime: Law and Regulation – Protection and Prosecution. Wendy R. London. 11. A Structured Control Methodology to Aid Data Security. John Mitchell. 12. Securing Your PC. Alex Mcintosh.

About the Author

John Gordon

Show more
Review this Product
Ask a Question About this Product More...
 
Look for similar items by category
People also searched for
Item ships from and is sold by Fishpond World Ltd.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.