Audit of Unix (English)
- New search for: Poole, V.
- New search for: Poole, V.
In:
Compsec 92 International
;
27-28
;
1992
-
ISBN:
- Conference paper / Print
-
Title:Audit of Unix
-
Contributors:Poole, V. ( author )
-
Conference:9th World conference on computer security, audit and control, Compsec 92 International ; 1992 ; London
-
Published in:Compsec 92 International ; 27-28
-
Publisher:
- New search for: Elsevier
-
Place of publication:Oxford
-
Publication date:1992-01-01
-
Size:2 pages
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
26 Principles for Information Security ControlsParker, D. B. et al. | 1992
- 9
-
Information Risk Management: a Targeted ApproachBadenhorst, K. / Eloff, J. H. P. et al. | 1992
- 21
-
Risk Assessment for EDI ImplementationCollins, B. S. et al. | 1992
- 27
-
Audit of UnixPoole, V. et al. | 1992
- 29
-
Practical Uses of InterrogationsTidy, A. et al. | 1992
- 37
-
Audit Retrieval SoftwareWilliams, P. et al. | 1992
- 53
-
Data Downloading TechniquesHiggins, N. et al. | 1992
- 61
-
The US Experience in Computer CrimeBequai, A. et al. | 1992
- 69
-
Dangers to Avoid in IT ContractsMillard, C. et al. | 1992
- 89
-
Computer Forensics: an IntroductionSommer, P. et al. | 1992
- 97
-
Reviewing Personal ComputersDaniel, M. et al. | 1992
- 105
-
German Savings Banks (BWS) EFTPOS DesignKorte, U. et al. | 1992
- 117
-
Public Key CryptographyBidzos, J. et al. | 1992
- 125
-
Practical aspects of securing electronic mail systemsRobertson, B. et al. | 1992
- 125
-
Practical Aspects of Securing E-Mail SystemsRobertson, B. et al. | 1992
- 135
-
Supporting Multiple Cryptographic Applications on a Single Host Security ModuleHuizinga, G. et al. | 1992
- 149
-
Don't Blame PasswordsWest, M. J. et al. | 1992
- 187
-
Open Systems - The Business DecisionEngland, J. et al. | 1992
- 193
-
Reviewing Logs Using Knowledge Based SystemsHardy, G. et al. | 1992
- 199
-
Audit Software to Detect Fraud (Pre-emptive Investigation)List, W. et al. | 1992
- 205
-
Introduction to Communications Audit and SecurityMorgan, K. / Hamer, T. et al. | 1992
- 235
-
Infosec in EuropeHerson, D. et al. | 1992
- 241
-
Reporting Security IncidentsMoses, R. H. et al. | 1992
- 249
-
European Security Awareness InitiativesClifton, T. R. / Cartwright, M. C. / McFarlane, N. R. et al. | 1992
- 257
-
The Fire at Mercantile Credit - April 1991Bampfield, R. A. et al. | 1992
- 269
-
After All This Planning, What Happens Next?Pursall, K. R. et al. | 1992
- 275
-
Cost-Effective Computer SecurityHurford, C. et al. | 1992
- 283
-
Building Security into the Business PlanHollins, J. D. et al. | 1992
- 293
-
Contigency PlanningHinde, S. et al. | 1992
- 311
-
International Data Protection ActivityHowe, E. et al. | 1992
- 317
-
Effective Computer Security in the Financial SectorOsbourne, K. et al. | 1992
- 329
-
Assessing the Automation Risks in Modern BankingVan Biene-Hershey, M. E. et al. | 1992
- 341
-
EDI Security: Risks and SolutionsKenny, P. et al. | 1992
- 353
-
EDI Security in PracticeClark, C. J. et al. | 1992
- 359
-
Five Steps to DisasterMitchell, J. et al. | 1992
- 371
-
Auditing the Contingency PlanFirth, D. A. et al. | 1992
- 379
-
Cost-Justification of System ControlsPinder, P. et al. | 1992
- 387
-
Using CRAMM in a National NewspaperJackson, N. / Glover, I. et al. | 1992
- 409
-
Security and Access Control in LANsMurray, W. H. et al. | 1992
- 419
-
Fighting the HackerSchifreen, R. et al. | 1992
- 441
-
Designing a Network Security ArchitectureWood, C. C. et al. | 1992
- 451
-
Auditing Systems under DevelopmentFisher, B. T. et al. | 1992
- 461
-
Improving Software QualityThomas, M. et al. | 1992
- 467
-
The Use of Metrics for Software DevelopmentJilek, P. / Moeller, K. H. / Paulish, D. J. et al. | 1992
- 477
-
Expanding the Role and Influence of Information SecurityWood, C. C. et al. | 1992