Finden Sie Ihr nächstes Lieblings-book

Werden Sie noch heute Mitglied und lesen Sie 30 Tage kostenlosBeginnen Sie Ihre kostenlosen 30 Tage

Informationen über das Buch

Breakdowns in Computer Security: Commentary and Analysis

Breakdowns in Computer Security: Commentary and Analysis

Buchaktionen

Mit Lesen beginnen
Länge: 81 Seiten1 Stunde

Beschreibung

Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years.
The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided.
Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial.
Mehr lesen
Breakdowns in Computer Security: Commentary and Analysis

Buchaktionen

Mit Lesen beginnen

Informationen über das Buch

Breakdowns in Computer Security: Commentary and Analysis

Länge: 81 Seiten1 Stunde

Beschreibung

Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years.
The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided.
Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial.
Mehr lesen