Computer Security

Computer Security

1st Edition - July 28, 1979

Write a review

  • Authors: David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick
  • eBook ISBN: 9781483218373

Purchase options

Purchase options
DRM-free (PDF)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.

Table of Contents


  • Foreword

    Preface

    Chapter 1 Introduction

    Chapter 2 Privacy and its Technical Implications on Security

    2.1 Background

    2.2 Legislation

    2.3 Cost of Privacy

    2.4 Future Developments

    2.5 Technical Implications for Security

    2.6 Postscript

    References

    Chapter 3 Operational Security

    3.1 Introduction

    3.2 Operational Considerations

    3.3 Organizational Impact

    3.4 Economics

    3.5 Security Objectives and Accountability

    3.6 Postscript

    References

    Chapter 4 Physical Security

    4.1 Against Natural Disasters

    4.2 Against Intruders

    4.3 Identification and Authentication

    4.4 Against Electronic and Electromagnetic Tampering

    4.5 Postscript

    References

    Chapter 5 Hardware Security

    5.1 Memory Protection

    5.2 Multiple Execution States

    5.3 Microprocessors a s Security Aids

    5.4 Minicomputers as Security Controllers

    5.5 Hardware Realization of Operating System Features

    5.6 Summary Remarks

    5.7 Postscript

    References

    Chapter 6 Cryptographic Transformations

    6.1 Cryptography

    6.2 Cryptographic Transformation Systems

    6.3 Postscript

    References

    Chapter 7 Operating System Security

    7.1 Surveillance

    7.2 Access Control

    7.3 Isolation

    7.4 Design and Implementation of Secure Operating Systems

    7.5 Postscript

    References

    Chapter 8 Database Security

    8.1 Access Decisions

    8.2 Access Paths

    8.3 Access Authorization and Resolution

    8.4 Implementation and Placement of Security Features

    8.5 Postscript

    References

    Author Index

    Subject Index

Product details

  • No. of pages: 318
  • Language: English
  • Copyright: © Academic Press 1979
  • Published: July 28, 1979
  • Imprint: Academic Press
  • eBook ISBN: 9781483218373

About the Authors

David K. Hsiao

Douglas S. Kerr

Stuart E. Madnick

About the Editor

Robert L. Ashenhurst

Ratings and Reviews

Write a review

There are currently no reviews for "Computer Security"