Information Management & Computer Security: Volume 3 Issue 1

Subjects:

Table of contents

Bridging the gaps

Martin Whybrow

Following recent London bomb attacks, examines the effectiveness ofdisaster recovery plans and the services that were available to assistrecovery. Also explores the mid‐ and…

431

Software Intelligence introduces a new cross‐platform, dient/server security solution

Elaine Irwin

Outlines plans and products of Software Intelligence′s new divisionAXENT Technologies which will concentrate on information securitysolutions for client/server computers.

441

Business interruption insurance: a vital ingredient in your disaster recovery plan

T.J. Paradine

Explains the importance of the risk management function as part ofthe disaster recovery‐planning process. Explains what you can and cannotinsure and the importance of not…

1895

Simplifying the state and federal computer crime law maze in the USA

Jay Bloombecker

Computer fraud, Law, Procedures, Punishment, USA Outlines in chartformat the definitions, prohibitions, procedures and punishments ofcomputer crime laws in the USA.

630

Testing the disaster recovery plan

Bruce Edwards, John Cooper

Organizations need to have undertaken an analysis of business riskand to have formulated a recovery plan. However, only a small number ofbusinesses have made any attempt to…

1836

Real security for local area networks

John Campbell

Describes a fifth‐operation software tool which is a powerfulnetwork manager that guards systems from intrusion and provides anaccurate system asset register.

603

Safeguarding databases: basic concepts revisited

Richard Cardinali

The thrust of management information system (MIS) operations is tokeep an information system running smoothly and to ensure services aredelivered in an uninterrupted, reliable and…

1383

What if you had a flood in your computer room

Kevin J. Fitzgerald

Deals with the dangers to computer systems from flooding andwater‐related hazards which so far appear to have been underestimated,and offers preventive and remedial advice to…

342

Information privacy

Graham Collier

Distinguishes between confidentiality and privacy of informationheld on individuals, the latter by companies, but doubts that privacy,where applicable, is respected by many…

3442
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid