Logo

An Introduction to Computer Security: The NIST Handbook

Small book cover: An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook
by


Number of pages: 296

Description:
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations. The handbook was written primarily for those who have computer security responsibilities and need assistance understanding basic concepts and techniques. Within the federal government, this includes those who have computer security responsibilities for sensitive systems.

Home page url

Download or read it online for free here:
Download link
(17MB, PDF)

Similar books

Book cover: Security ConceptsSecurity Concepts
by - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
(11763 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9838 views)
Book cover: Security+ EssentialsSecurity+ Essentials
- Techotopia
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.
(15875 views)
Book cover: Cyber Infrastructure ProtectionCyber Infrastructure Protection
by - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(11401 views)