Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities.
The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators.
The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Table of Contents |
skim chapter | |
---|---|---|
Front Matter | i-xvi | |
Executive Summary | 1-6 | |
Overview and Recommendations | 7-48 | |
Concepts of Information Security | 49-73 | |
Technology to Achieve Secure Computer | 74-101 | |
Programming Methodology | 102-123 | |
Criteria to Evaluate Computer and Network Security | 124-142 | |
Why the Security Market Has Not Worked Well | 143-178 | |
The Need to Establish an Information Security Foundation | 179-205 | |
Research Topics and Funding | 206-215 | |
Bibliography | 216-240 | |
A The Orange Book | 241-245 | |
B Selected Topics in Computer Security Technology | 246-275 | |
C Emergency Response Teams | 276-277 | |
D Models for GSSP | 278-282 | |
E High-grade Threats | 283-285 | |
F Glossary | 286-302 | |
G List of Members of the Former Commission on Physical Sciences, Mathematics, and Resources | 303-304 |
The National Academies Press and the Transportation Research Board have partnered with Copyright Clearance Center to offer a variety of options for reusing our content. You may request permission to:
For most Academic and Educational uses no royalties will be charged although you are required to obtain a license and comply with the license terms and conditions.
Click here to obtain permission for Computers at Risk: Safe Computing in the Information Age.
For information on how to request permission to translate our work and for any other rights related query please click here.
For questions about using the Copyright.com service, please contact:
Copyright Clearance Center
22 Rosewood Drive
Danvers, MA 01923
Tel (toll free): 855/239-3415 (select option 1)
E-mail: info@copyright.com
Web: https://www.copyright.com
Loading stats for Computers at Risk: Safe Computing in the Information Age...