Table Of Contents: Volume 3 Issue 1
Following recent London bomb attacks, examines the effectiveness ofdisaster recovery plans and the services that were available to assistrecovery. Also explores the midâ…
Outlines plans and products of Software Intelligenceâ˛s new divisionAXENT Technologies which will concentrate on information securitysolutions for client/server computers.
Explains the importance of the risk management function as part ofthe disaster recoveryâplanning process. Explains what you can and cannotinsure and the importance of not…
Computer fraud, Law, Procedures, Punishment, USA Outlines in chartformat the definitions, prohibitions, procedures and punishments ofcomputer crime laws in the USA.
, John Cooper
Organizations need to have undertaken an analysis of business riskand to have formulated a recovery plan. However, only a small number ofbusinesses have made any attempt…
Describes a fifthâoperation software tool which is a powerfulnetwork manager that guards systems from intrusion and provides anaccurate system asset register.
The thrust of management information system (MIS) operations is tokeep an information system running smoothly and to ensure services aredelivered in an uninterrupted…
Kevin J. Fitzgerald
Deals with the dangers to computer systems from flooding andwaterârelated hazards which so far appear to have been underestimated,and offers preventive and remedial advice…
Distinguishes between confidentiality and privacy of informationheld on individuals, the latter by companies, but doubts that privacy,where applicable, is respected by…