Advertisement

Introduction

  • John M. D. Hunter
Part of the Computer Communications and Networks book series (CCN)

Abstract

This book began life as a simplified guide to the United Kingdom government security guidelines for the protection of information systems. This guide was used as a text for third year and post-graduate courses at the Royal Military College of Science where a large proportion of the students are either in the armed forces or in government service. Most of these guidelines are entirely appropriate for conventional commercial systems. Some of them are not and are specific to government systems and national security. It is hoped that the inappropriate bits have all been removed.

Keywords

Information Security Security Policy Security Requirement Security Measure Software Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • John M. D. Hunter
    • 1
  1. 1.CISM GroupCranfield University, RMCSShrivenham, SwindonUK

Personalised recommendations