• M. Shain


We have seen that the key elements in achieving information security involve the detection of threats, reduction in vulnerability to such threats (see chapter 2), and the ability to recover in the event of an impact. The controls and procedures that form part of a security programme should ideally have been established through the process of risk analysis.


Access Control Information Security Access Privilege Computer Virus Physical Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Broadbent, D., Contingency Planning (NCC Publications, 1979)Google Scholar
  2. Hearnden, K., A Handbook of Computer Security (Kogan Page, 1987)Google Scholar
  3. Hutt, A.E., Bosworth, S., Hoyt, D.B., Computer Security Handbook (Macmillan, 1988)Google Scholar
  4. Lobel, J., Foiling the System Breakers (McGraw-Hill Book Company, 1986)Google Scholar
  5. Wood, Michael B., Computer Access Control (NCC Publications, 1985)Google Scholar
  6. Wood, Michael B., Introducing Computer Security (NCC Publications, 1982)Google Scholar
  7. Wood, Michael B., Physical Computer Security (NCC Publications, 1986).Google Scholar

Copyright information

© Palgrave Macmillan, a division of Macmillan Publishers Limited 1989

Authors and Affiliations

  • M. Shain

There are no affiliations available

Personalised recommendations