Information Management & Computer Security: Volume 3 Issue 4

Subjects:

Table of contents

Security environment reviews

Gregory R. Doddrell

Today, information technology is fundamental to the operation ofmost businesses, whether they are small companies or multinationalcorporations. In recent times, the implementation…

1042

Information security and the Internet

Gregory R. Doddrell

Discusses the business vulnerabilities when using the Internet.Focuses on the logical barriers required to minimize these exposures.Explains why protection is required and…

5043

Protecting availability in complex computer environments

Barry Gubbins

As online business dependencies continue to rise and at the sametime tend to rely on more and more complex environments, the risk ofcomputer service interruption, i.e. disruption…

390

The Charles Cresson Wood file

Charles Cresson Wood

Introduces a series of contributions on computer security. Beginsby pointing out that information is an organizational asset which needsto be protected. Policies are the primary…

383

Security and data integrity for LANs and WANs

Kevin J. Fitzgerald

In a distributed computing environment, ownership of the securityproblem is avoided by management and users alike. Not only integrity andconfidentiality, but also network (i.e…

2265
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid