System Administration and Security

  • John M. D. Hunter
Part of the Computer Communications and Networks book series (CCN)


No information security can rely on the standard list of physical, personnel and technical security measures. Unfortunately, unless the information system is diligently administered, the quality of the system security will rapidly deteriorate. This is an inconvenient aspect of security all too often overlooked by politicians and administrators trying to cut costs.


Open Source Software Security Policy Certification Process Audit Trail Soft System Methodology 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • John M. D. Hunter
    • 1
  1. 1.CISM GroupCranfield University, RMCSShrivenham, SwindonUK

Personalised recommendations