He has been responsible for design and manufacture, system analysis, programming, and operations of both digital and analog computers. Monitoring and Control Systems D. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Kennedy Chapter 13 The Insider Threat Gary L. Writing Secure Code Lester E. Toward a New Framework for Information Security Donn B.
Working with Law Enforcement M. Web Monitoring and Content Filtering Steven Lovaas. Securing Stored Data David J. Censorship and Content Filtering L. Computer Security Incident Response Teams Michael Miora, M.
Software Development and Quality Assurance D. Ethical Decision Making and High Technology J. Kabay, Don Holden, and Myles Walsh. Using Social Psychology to Implement Security Policies M. Operating System Security William Stallings.
Kabay, and Tim Crothers Chapter 16 Malicious Code Robert Guess and Eric Salveggio Chapter 17 Mobile Code Robert Gezelter Chapter 18 Denial-of-Service Attacks Gary C. Legal and Regulatory Security Issues Timothy Virtue. The Legal Framework for Protecting Intellectual Property in the Field of Computing and Computer Software W. Each course will have the lectures and discussions recorded and available for download — and there will be a dedicated discussion group online for participants to discuss points and questions. The Dangerous Information Technology Insider: Psychological Characteristics and Career Patterns Jerrold M.
Since 1972 Bosworth has been a contributing editor to all four editions of the Computer Security Handbook, and he has written many articles and lectured extensively about computer security and other technical and managerial subjects. Requiring minimal technical knowledge to understand, covered topics include: foundations of computer security, threats and vulnerabilities, prevention, detection, remediation, management's role, and other considerations such as using encryption internationally, anonymity and identity in cyberspace, and censorship. Ethical Decision Making and High Technology James Landon Linderman. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Protecting Digital Rights: Technical Approaches Robert Guess, Jennifer Hadley, Steven Lovaas, and Diane E.
Mich Kabay, my coeditor from the fourth edition, and Eric Whyne, our new third editor, continue in that tradition. The new edition continues a long tradition of maintaining highly regarded industry guidelines for detecting virtually every possible threat to your system and prescribes specific actions you can take to eliminate them. Fundamentals of Intellectual Property Law William A. Then add your suggested correction. Employment Practices and Policies M. Physical Threats to the Information Infrastructure Franklin Platt. The Future of Information Security P.
We expect to start working in earnest on the Sixth Edition around 2013 and publish it in 2015. This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security. Johnson, Nicholas Takacs, and Jennifer Hadley. Mathematical Models of Computer Security Matt Bishop. Antivirus Technology Chey Cobb and Allysa Myers. The Psychology of Computer Criminals Q.
Johnson, Nicholas Takacs, Jennifer Hadley, and M. Management Responsibilities and Liabilities C. Data Communications and Information Security Raymond Panko. . He has worked as a researcher for the National Center for the Study of Counter-Terrorism and Cyber Crime.