An Introduction to Computer Security: The NIST Handbook by Barbara Guttman PDF

By Barbara Guttman

ISBN-10: 0788128302

ISBN-13: 9780788128301

Show description

Read Online or Download An Introduction to Computer Security: The NIST Handbook PDF

Best computers books

Implementation and Application of Automata: 10th by Rūsiņš Freivalds (auth.), Jacques Farré, Igor Litovsky, PDF

This booklet constitutes the completely refereed post-proceedings of the tenth foreign convention on Implementation and alertness of Automata, CIAA 2005, held in Sophia Antipolis, France, in June 2005. The 26 revised complete papers and eight revised poster papers provided including 2 invited contributions have been chosen from 87 submissions and feature passed through rounds of reviewing and development.

Read e-book online Logic Programming: 19th International Conference, ICLP 2003, PDF

This booklet constitutes the refereed lawsuits of the nineteenth overseas convention on good judgment Programming, ICLP 2003, held in Mumbai, India in December 2003. The 23 revised complete papers and 19 poster papers offered including five invited complete contributions and abstracts of four invited contributions have been rigorously reviewed and chosen from eighty one submissions.

Download e-book for iPad: Adobe InDesign CS4 Styles: How to Create Better, Faster Text by Michael Murphy

Faucet into the far-reaching capability of InDesign styles—from easy drop cap formatting to cross-media export to XHTML. types have the ability to rework how layout and creation execs procedure and attain any venture. Adopting a style-centric workflow can decrease initiatives that might ordinarily take days to mere hours, and initiatives that might take hours to mins or maybe seconds.

AutoCAD 2006 Подробное иллюстрированное руководство by A. Zhadaev PDF

Эта книга научит вас использовать программу AutoCAD 2006 для создания сложных чертежей различных механизмов, зданий и других объектов. Замечательная особенность книги - нацеленность на практическое применение.

Additional resources for An Introduction to Computer Security: The NIST Handbook

Sample text

Sessions, testimony before the House Subcommittee on Economic and Commercial Law, Committee on the Judiciary, 29 April 1992. 26 4. 7 Malicious Code Malicious code refers to viruses, worms, Trojan horses, logic bombs, and other "uninvited" software. Sometimes mistakenly associated only with personal computers, malicious code can attack other platforms. 40, 41 Actual costs attributed to the presence of malicious code have resulted primarily from system outages and staff time involved in repairing the systems.

It is also often useful to specify the goal or justification for the policy which can be helpful in gaining compliance with the policy. For example, an organization might want to develop an issue-specific policy on the use of "unofficial software," which might be defined to mean any software not approved, purchased, screened, managed, and owned by the organization. Additionally, the applicable distinctions and conditions might then need to be included, for instance, for software privately owned by employees but approved for use at work, and for software owned and used by other businesses under contract to the organization.

Standards are normally compulsory within an organization. Guidelines assist users, systems personnel, and others in effectively securing their systems. The nature of guidelines, however, immediately recognizes that systems vary considerably, and imposition of standards is not always achievable, appropriate, or cost-effective. For example, an organizational guideline may be used to help develop system-specific standard procedures. Guidelines are often used to help ensure that specific security measures are not overlooked, although they can be implemented, and correctly so, in more than one way.

Download PDF sample

An Introduction to Computer Security: The NIST Handbook by Barbara Guttman

by Jeff

Rated 4.70 of 5 – based on 39 votes

Categories: Computers