home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
HACKING
/
BOOKS.TXT
< prev
next >
Wrap
Text File
|
1994-07-17
|
42KB
|
730 lines
BIBLIOGRAPHY OF COMPUTER SECURITY BOOKS
(1973 through 1988)
Note: A bibliography is now being developed to encompass 1989.
ABUSE/MISUSE/CRIME
AUTHOR: Fennelly, Lawrence J.
TITLE: Handbook of Loss Prevention and Crime
Prevention
ORGANIZATION:
VOLUME NO:
EDITION NO: Second
NAME OF PUBLISHER: Butterworth Publishers
LOCATION OF PUBLISHER: Stoneham, MA
PUBLICATION DATE: October 1988
CATEGORY: Abuse/Misuse/Crime
COST: $69.95
DESCRIPTION: This book brings together the
expertise of over 40 security and crime prevention
professionals with information on the latest
technology, trends, and references.
AUTHOR: Lobel, Jerome
TITLE: Foiling The Systems Breakers
ORGANIZATION:
VOLUME NO:
EDITION NO: First
NAME OF PUBLISHER: McGraw-Hill Book Company
LOCATION OF PUBLISHER: New York
PUBLICATION DATE: 1986
CATEGORY: Abuse/Misuse/Crime
COST: $34.95
DESCRIPTION: This book is designed to help system
designers and data processing staff find ways to
protect computer systems from unauthorized access.
AUTHOR: U.S. Department of Justice
TITLE: Computer Crime: Computer Security
Techniques
ORGANIZATION: U.S. Department of Justice
VOLUME NO:
EDITION NO: First
NAME OF PUBLISHER: U.S. Department of Justice
LOCATION OF PUBLISHER: Washington, D.C.
PUBLICATION DATE: Not Given TBD
CATEGORY: Abuse/Misuse/Crime
COST: Free
DESCRIPTION: Presents the results of a major
review of the computer security procedures
currently employed in the public and private
sectors.
AUTHOR: U.S. Department of Justice
TITLE: Computer Crime: Electronic Fund Transfer
Systems and Crime
ORGANIZATION: U.S. Department of Justice
VOLUME NO:
EDITION NO: First
NAME OF PUBLISHER: U.S. Department of Justice
LOCATION OF PUBLISHER: Washington, D.C.
PUBLICATION DATE: 1982
CATEGORY: Abuse/Misuse/Crime
COST: Free
DESCRIPTION: Reviews the crime-related
implications of the growth of computer usage in
EFT, and the nature and magnitude of EFT crimes.
AUTHOR: Van Duyn, Julia
TITLE: The Human Factor in Computer Crime
ORGANIZATION: Institute of Internal Auditors
VOLUME NO:
EDITION NO:
NAME OF PUBLISHER: Petrocelli Books, Inc.
LOCATION OF PUBLISHER: New York, Princeton
PUBLICATION DATE: 1984
CATEGORY: Abuse/Misuse/Crime
COST: $24.95
DESCRIPTION: States that insiders in a company
are the ones most likely to commit computer abuse.
A list of procedures that management can follow to
make their installation secure is included.
ACCESS CONTROL
AUTHOR: Abrams, M.D. and Podell, H.J.
TITLE: Computer and Network Security
ORGANIZATION:
VOLUME NO:
EDITION NO: First
NAME OF PUBLISHER: Computer Society
LOCATION OF PUBLISHER: Los Alamitos, CA
PUBLICATION DATE: 1987
CATEGORY: Access Control
COST: $50.00
DESCRIPTION: Examines information system security
with regard to computer, data, and network
security.
AUTHOR: Bowers, Dan M.
TITLE: Access Control and Personal Identification
Systems
ORGANIZATION:
VOLUME NO:
EDITION NO: First
NAME OF PUBLISHER: Butterworth Publishers
LOCATION OF PUBLISHER: Stoneham, MA
PUBLICATION DATE: 1988
CATEGORY: Access Control
COST: $24.95
DESCRIPTION: Presents a thorough examination of
access control systems and devices for security
managers and practitioners in the field.
AUTHOR: Davies, D.W. and Price, W.L.
TITLE: Security for Computer Networks: An
Introduction to Data Security in Teleprocessing
ORGANIZATION: National Physical Laboratory
VOLUME NO:
EDITION NO: First
NAME OF PUBLISHER: John Wiley & Sons, Inc.
LOCATION OF PUBLISHER: New York
PUBLICATION DATE: 1984
CATEGORY: Access Control
COST: $34.95
DESCRIP