Part I.THE THREAT TO COMPUTER SECURITY, 1 Essentials of Computer Security, 2 Computer Crime and the Law, Part II.SECURITY MANAGEMENT CONSIDERATIONS, 3 Organizing for Information Management,4 Protection of matter, 5 Screening and Management of Personnel, 6 Physical Access Control, 7 Physical Security, 8 Environmental, 9 Disaster Control, Part III. COMMUNICATIONS SECURITY, 10 Line Security, 11 Transmission Security, 12 Cryptographic Security, 13 Emanations, 14 Technical Security, Part IV.
SYSTEMS SECURITY, 15 Systems Identification, 16 Isolation in computer systems, 17 Systems Access Control, 18 Detection and Surveillance, 19 Systems Integrity, 20 Systems Reliability and Security, 21 Security and Personal Computers, Part V. INFORMATION SECURITY RISK ANALYSIS, 22 Systems Approach to Risk Management, 23 Threat Assessment, 24 Assets and Safeguards, 25 Keeping Secrets in Computers, 26 Modes of Risk Analysis, Appendix: Sample Log Forms, Glossary, Selected Bibliography, Index.