Information Management & Computer Security: Volume 3 Issue 4

Subjects:

Table of contents

Security environment reviews

Gregory R. Doddrell

Today, information technology is fundamental to the operation ofmost businesses, whether they are small companies or multinationalcorporations. In recent times, the implementation…

1039

Information security and the Internet

Gregory R. Doddrell

Discusses the business vulnerabilities when using the Internet.Focuses on the logical barriers required to minimize these exposures.Explains why protection is required and…

5041

Protecting availability in complex computer environments

Barry Gubbins

As online business dependencies continue to rise and at the sametime tend to rely on more and more complex environments, the risk ofcomputer service interruption, i.e. disruption…

388

The Charles Cresson Wood file

Charles Cresson Wood

Introduces a series of contributions on computer security. Beginsby pointing out that information is an organizational asset which needsto be protected. Policies are the primary…

380

Security and data integrity for LANs and WANs

Kevin J. Fitzgerald

In a distributed computing environment, ownership of the securityproblem is avoided by management and users alike. Not only integrity andconfidentiality, but also network (i.e…

2254
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid