Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
The emergence of a new type of threat to computer security - the computer virus - has attracted much attention from the media, researchers, and entrepreneurs. It is clear that computer viruses and other software menaces, like their biological counterparts, are here to stay. This poses a particular problem for organizations which use computers - how to minimize the threat to their information systems without unduly disrupting their functioning.
This book presents a concise overview of the problem and a detailed framework for dealing with computer viruses in organizations. Managers are the target audience, and will find that it offers more than the usual technical information. There is a wealth of advice, much of which applies to the problem of computer security in general. There are also a number of useful technical appendices and an in-depth insight into the biological analogy.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
The emergence of a new type of threat to computer security - the computer virus - has attracted much attention from the media, researchers, and entrepreneurs. It is clear that computer viruses and other software menaces, like their biological counterparts, are here to stay. This poses a particular problem for organizations which use computers - how to minimize the threat to their information systems without unduly disrupting their functioning.
This book presents a concise overview of the problem and a detailed framework for dealing with computer viruses in organizations. Managers are the target audience, and will find that it offers more than the usual technical information. There is a wealth of advice, much of which applies to the problem of computer security in general. There are also a number of useful technical appendices and an in-depth insight into the biological analogy.