Computer security principles, Internet security, risk identification, network firewalls, proxy applications, screened sub-nets, providing unsecured services, air gap networks, non-IP connection, external access, World Wide Web (WWW) security issues, funds transfer issues, other application specific security issues and the role of audit. |