Security Management Guide (G06.24+, H06.03+)
About This Manual
Security Management Guide—522283-008
xv
OSS Environment
OSS Environment
•
Open System Services User’s Guide
•
Open System Services Management and Operations Guide
•
Open System Services Shell and Utilities Reference Manual
•
Open System Services System Calls Reference Manual
Atalla Security Tools
•
Atalla Key Block Banking Command Reference Manual
•
Installation and Operations Guide for Atalla NSP Series Products
General Security*
•
Security, Accuracy, and Privacy in Computer Systems, J. Martin, Prentice Hall,
1973.
•
Crime by Computer, D. Parker, Charles Scribner’s Sons, 1976.
•
Your Computer and the Law, R. Bigelow and S. Nycum, Prentice Hall, 1976.
•
The Investigation of Computer Crime, J. Becker, U. S. Department of Justice,
1980.
•
Computer Security Management, D. Parker, Reston Publishing Company, 1981.
•
Computer Insecurity, A. Norman, Chapman and Hall, 1983.
•
Computer: Crimes, Clues and Controls, A management guide, U. S. Government
Printing Office, March 1986.
•
Control and Security of Computer Information Systems, P. E. Fites, M. P. J. Kratz,
A. F. Brebner, Computer Science Press, 1989.
•
Practical UNIX & Internet Security, Second Edition, S. Garfinkel and G. Spafford,
O’Reilly & Associates, Inc., April 1996.
•
Secrets and Lies: Digital Security in a Networked World, B. Schneier, John Wiley
and Sons, August 2000.
•
Incident Response: Investigating Computer Crime, K. Mandia and C. Prosise,
Osborne McGraw-Hill, June 2001.
•
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, R.
Krutz, et al, John Wiley and Sons, August 2001.
•
Information Security Management Handbook, 4th Edition, Volumes 1, 2, and 3, H.
Tipton and M. Krause, Auerbach Publications, November 2001.
•
Computer Security Handbook, 4th Edition, S. Bosworth and M. Kabay, John Wiley
and Sons, April 2002.