Fundamentals of computer security technology
Fundamentals of computer security technology
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Computer related risks
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Mecklermedia's Official Internet World Internet Security Handbook
Mecklermedia's Official Internet World Internet Security Handbook
Robust and Secure Password and Key Change Method
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course
Hi-index | 0.00 |
The nineties set off the "information age". Companies, organisations, the whole society have become utterly dependent on computers for their proper functioning. Since information gathering, processing and distributing have become so important, it should be treasured as a strategic asset, and therefore, properly protected. In this paper, we first focus on the security policy. Then we examine the major threats that may compromise the security of information systems. Finally, we present an overview of security measures is presented.