|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T t
Length: 1096 (0x448) Types: TextFile Names: »title.tex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z« └─⟦5c5f5f2d8⟧ └─⟦this⟧ »title.tex«
\begin{titlepage} \title{Coping with the Threat of Computer Security Incidents \\A Primer from Prevention through Recovery} \date{June 8, 1990} \author{Russell L. Brand \thanks{Copyright \copyright\ Russell L. Brand 1989, 1990 Permission to copy and redistribute this information in whole or in part is granted provided each copy includes attribution and the version information. This permission extends for one year minus one day from June 8, 1990; past that point, the reader should obtain a newer copy of the article as the information will be out of date. }} \maketitle \begin{abstract} As computer security becomes a more important issue in modern society, it begins to warrant a systematic approach. The vast majority of the computer security problems and the costs associated with them can be prevented with simple inexpensive measures. The most important and cost effective of these measures are available in the prevention and planning phases. These methods are presented followed by a simplified guide to incident handling and recovery. \end{abstract} \end{titlepage}