A security model for military message systems
ACM Transactions on Computer Systems (TOCS)
Computer security: a comprehensive controls checklist
Computer security: a comprehensive controls checklist
Security in computing
Building a secure computer system
Building a secure computer system
A methodology for penetration testing
Computers and Security
The matrix: computer networks and conferencing systems worldwide
The matrix: computer networks and conferencing systems worldwide
Disaster recovery planning for academic computing centers
Communications of the ACM
Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
Practical UNIX security
Computer security basics
UNIX password security—ten years later
CRYPTO '89 Proceedings on Advances in cryptology
Information security handbook
UNIX system security: a guide for users and system administrators
UNIX system security: a guide for users and system administrators
Computers and Security
Computers and Security
Understanding VAX/VMS security
Computers and Security
Privacy policies and practices: inside the organizational maze
Communications of the ACM
Information systems security: a practitioner's reference
Information systems security: a practitioner's reference
Duress terminations and information security
Computers and Security
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Computer related risks
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Guidelines for the Security of Information Systems
Guidelines for the Security of Information Systems
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Sabotage in the American WorkPlace: Anecdotes of Dissatisfaction, Mischief and Revenge
Sabotage in the American WorkPlace: Anecdotes of Dissatisfaction, Mischief and Revenge
System Development Auditor
New directions in cryptography
IEEE Transactions on Information Theory
Formal threat descriptions for enhancing governmental risk assessment
Proceedings of the 1st international conference on Theory and practice of electronic governance
Improving Xen security through disaggregation
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
An ontology- and Bayesian-based approach for determining threat probabilities
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations.The handbook provides a broad overview of computer security to help readers understand their computer security needs and develop a sound approach to the selection of appropriate security controls. It does not describe detailed steps necessary to implement a computer security program, provide detailed implementation procedures for security controls, or give guidance for auditing the security of specific systems.