Security Management Guide (G06.24+, H06.03+)

About This Manual
Security Management Guide522283-008
xv
OSS Environment
OSS Environment
Open System Services User’s Guide
Open System Services Management and Operations Guide
Open System Services Shell and Utilities Reference Manual
Open System Services System Calls Reference Manual
Atalla Security Tools
Atalla Key Block Banking Command Reference Manual
Installation and Operations Guide for Atalla NSP Series Products
General Security*
Security, Accuracy, and Privacy in Computer Systems, J. Martin, Prentice Hall,
1973.
Crime by Computer, D. Parker, Charles Scribners Sons, 1976.
Your Computer and the Law, R. Bigelow and S. Nycum, Prentice Hall, 1976.
The Investigation of Computer Crime, J. Becker, U. S. Department of Justice,
1980.
Computer Security Management, D. Parker, Reston Publishing Company, 1981.
Computer Insecurity, A. Norman, Chapman and Hall, 1983.
Computer: Crimes, Clues and Controls, A management guide, U. S. Government
Printing Office, March 1986.
Control and Security of Computer Information Systems, P. E. Fites, M. P. J. Kratz,
A. F. Brebner, Computer Science Press, 1989.
Practical UNIX & Internet Security, Second Edition, S. Garfinkel and G. Spafford,
O’Reilly & Associates, Inc., April 1996.
Secrets and Lies: Digital Security in a Networked World, B. Schneier, John Wiley
and Sons, August 2000.
Incident Response: Investigating Computer Crime, K. Mandia and C. Prosise,
Osborne McGraw-Hill, June 2001.
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, R.
Krutz, et al, John Wiley and Sons, August 2001.
Information Security Management Handbook, 4th Edition, Volumes 1, 2, and 3, H.
Tipton and M. Krause, Auerbach Publications, November 2001.
Computer Security Handbook, 4th Edition, S. Bosworth and M. Kabay, John Wiley
and Sons, April 2002.