Team LiB   Previous Section   Next Section

Guides for Managers and Policymakers

Allen, Julia et al. Security for Information Technology Service Contracts (CMU/SEI-SIM-003, ADA 336329). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1998. Available online: <http://www.cert.org/security-improvement/modules/m03.html>.

Best, Reba A. and Piquet, D. Cheryl. Computer Law and Software Protection: A Bibliography of Crime, Liability, Abuse, and Security. Jefferson, NC: McFarland, 1993.

Cappel, James J.; Vanecek, Michael T.; and Vedder, Richard G. "CEO and CIO Perspectives on Competitive Intelligence." Communications of the ACM (August 1999).

Dijker, Barbara L., ed. Short Topics in System Administration. Vol. 2, A Guide to Developing Computing Policy Documents. Berkeley, CA: The USENIX Association for SAGE, the System Administrators Guild, 1996.

Guttman, B. and Bagwill, R. Internet Security Policy: A Technical Guide. Gaithersburg, MD: NIST Special Publication 800-XX, 1997. Available online: <http://csrc.nist.gov/isptg/html/>.

Kimmins, John; Dinkel, Charles; and Walters, Dale. Telecommunications Security Guidelines for Telecommunications Management Network (NIST Special Publication: 800-13). Gaithersburg, MD: Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1995.

Kuncicky, D. and Wynn, B. A. Short Topics in System Administration, Vol. 4, Educating and Training System Administrators: A Survey. Berkeley, CA: The USENIX Association for the System Administrators Guild (SAGE), 1998.

Oppenheimer, David L.; Wagner, David A.; and Crabb, Michele D. Short Topics in System Administration, Vol. 3, System Security: A Management Perspective. Berkeley, CA: The USENIX Association for the System Administrators Guild (SAGE), 1997.

Phillips, G. Short Topics in System Administration, Vol. 5, Hiring System Administrators. Berkeley, CA: The USENIX Association for the System Administrators Guild (SAGE), 1999.

Regan, Priscilla M. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill, NC: University of North Carolina Press, 1995.

Schweitzer, James A. Protecting Business Information: A Manager's Guide. Boston: Butterworth-Heinemann, 1996.

Sterling, Bruce. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Bantam Books, 1992.

Wood, Charles Cresson. Information Security Policies Made Easy Version 7. Baseline Software, Inc., 2000.

    Team LiB   Previous Section   Next Section