1. An Organisation for Security in a Major Company. Charles Brookson. 2. Information Technology Security Evaluation: Management Summary. Eric Roche. 3. Closing the Evaluation Gap – the CLEF Experience. Andrew Clark and Andrea Cumming. 4. Mechanisms of Stealth. Alan Solomon. 5. Computer Viruses. Jan Hruska. 6. Security Modelling. John Gordon. 7. Secure Delivery of Software. Fiona Williams and Samantha Green. 8. Digital Signatures for Non-Repudiation. Fred Piper. 9. Network Encryption Management. Vince Gallo. 10. Computer Crime: Law and Regulation – Protection and Prosecution. Wendy R. London. 11. A Structured Control Methodology to Aid Data Security. John Mitchell. 12. Securing Your PC. Alex Mcintosh.
John Gordon
![]() |
Ask a Question About this Product More... |
![]() |