Table of contents
Security environment reviews
Gregory R. DoddrellToday, information technology is fundamental to the operation ofmost businesses, whether they are small companies or multinationalcorporations. In recent times, the implementation…
Information security and the Internet
Gregory R. DoddrellDiscusses the business vulnerabilities when using the Internet.Focuses on the logical barriers required to minimize these exposures.Explains why protection is required and…
Protecting availability in complex computer environments
Barry GubbinsAs online business dependencies continue to rise and at the sametime tend to rely on more and more complex environments, the risk ofcomputer service interruption, i.e. disruption…
The Charles Cresson Wood file
Charles Cresson WoodIntroduces a series of contributions on computer security. Beginsby pointing out that information is an organizational asset which needsto be protected. Policies are the primary…
Security and data integrity for LANs and WANs
Kevin J. FitzgeraldIn a distributed computing environment, ownership of the securityproblem is avoided by management and users alike. Not only integrity andconfidentiality, but also network (i.e…