Computer Security ManagementPrentice-Hall, 1972 - 220 Seiten Computer crime; Company security; Embezzlement: detection and control; EDP controls; Auditing; Program error; Operator error; Operator fraud; Programmer fraud; Software protection; Fire protection; Disaster and catastrophe prevention; Insurance; Cryptographic techniques; Service bureaus; Time-sharing; Computer privacy. |
Inhalt
COMPUTER CRIME | 8 |
DETECTION AND CONTROL | 26 |
The Vanishing Trail | 45 |
Urheberrecht | |
14 weitere Abschnitte werden nicht angezeigt.
Andere Ausgaben - Alle anzeigen
Häufige Begriffe und Wortgruppen
able accounts actual addition allowed amount applicable audit auditor authorization back-up bank building cards caused changes Company complete computer center computer security Conference considered copy cost covered cryptographic damage data processing designed destroyed developed disaster discussion documentation electronic embezzlement employee equipment errors establish example expense files fire fraud give hardware industrial installations Insuring Agreement interest internal involved keep limit loss magnetic Management measures method necessary normally notice obtain OFFICE operator password patent period person personnel Policy possible premises prevent problem procedures protection reason receivable records replacement reports responsible result risks ROOM secret service bureau similar situation storage stored tapes techniques terminal time-sharing tion usually written