dc.contributor.author |
Guttman, Barbara |
|
dc.contributor.author |
Roback, Edward |
|
dc.date.accessioned |
2023-06-30T21:21:36Z |
|
dc.date.available |
2023-06-30T21:21:36Z |
|
dc.date.issued |
1995-10 |
|
dc.identifier.uri |
${sadil.baseUrl}/handle/123456789/3731 |
|
dc.description |
290 p. (PDF) |
sm |
dc.description.abstract |
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations. The handbook provides a broad overview of computer security to help readers understand their computer security needs and develop a sound approach to the selection of appropriate security controls. It does not describe detailed steps necessary to implement a computer security program, provide detailed implementation procedures for security controls, or give guidance for auditing the security of specific systems. |
sm |
dc.description.sponsorship |
The Computer System Security and Privacy Advisory Board, in particular, Robert Courtney, Jr. NIST management officials who supported this effort include: James Burrows, F. Lynn McNulty, Stuart Katzke, Irene Gilbert, and Dennis Steinauer. |
sm |
dc.language.iso |
en |
sm |
dc.publisher |
National Institute of Standards and Technology Technology Administration U.S. Department of Commerce |
sm |
dc.subject |
Computer security |
sm |
dc.subject |
guidance |
sm |
dc.subject |
IT security |
sm |
dc.subject |
security controls |
sm |
dc.title |
An introduction to computer security |
sm |
dc.title.alternative |
the NIST handbook |
sm |
dc.type |
Book |
sm |