A collection of 27 essays that provide an overview of the vulnerabilities and threats to information security and introduce the important concepts and terms. In addition, the essays summarize the definitions and controls of the trusted computer system evaluation criteria and discuss information security policy, focusing on information control and d
"synopsis" may belong to another edition of this title.