Skip to Main Content
The protection of computing systems and the information they maintain and process has been of concern since the early days of computing. Summers provides an overview of computer security, including the concepts, techniques, and measures that may be applied to the protection of information systems assets. This paper offers the reader an excellent survey of both the technical and the administrative measures which should be considered in developing a strategy for the protection of computer-based systems.
Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.