Chapter 1 - Computer Security Handbook, Sixth Edition.pdf

2 for further details see for example

This preview shows page 19 - 20 out of 20 pages.

2. For further details, see, for example, jones/cards . 3. See history/UNIVAC.Weston.html and 4. It is notable that the IBM 1401 computer was so named because the initial model had 1,400 bytes of main memory. It was not long before memory size was raised to 8 kilobytes and then later to as much as 32 kilobytes. In 1980, the Series III minicomputer from Hewlett-Packard doubled its maximum memory from 1 megabyte to 2 megabytes at a cost of $64,000 (about $200,000 in 2008 dollars). This compares with today's personal computers, typically equipped with no less than 512 megabytes and often a gigabyte or more. 5. The term "dumb" was used because the terminal had no internal storage or processing capability. It could only receive and display characters and accept and transmit keystrokes. Both the received characters and the transmitted ones were displayed on a cathode ray tube (CRT) much like a pre-color television screen. Consequently, these were also called "glass" terminals. 6- "Multiprocessing," "multiprogramming," and "multitasking" are terms that are used almost interchangeably today. Originally, multitasking implied that several modules or subroutines of a single program could execute together. Multiprogramming was designed to execute several different programs, and their subroutines, concurrently. Multiprocessing most often meant that two or more computers worked together to speed program execution by providing more resources. 7. Also known as ARPA net and Arpanet. 8. First published in 1975; reissued by Mass Market Paperbacks in May 1990. 9. "Fixed," in contrast with the removable disk packs common in large data centers. 10. See 11. Sean P. Conroy, "History of Virtualization," Everything VM, 2010. 12. G. H. Invalid, Proposed Technical Evaluation Criteria for Trusted Computer Systems. Publication M79-225 (Bedford, MA: MITRE Corporation, 1999). 13. For access to all the Rainbow Series documents, see 14. The CCEVS Website has extensive documentation; see
Image of page 19

Subscribe to view the full document.

15. This section is reprinted with slight modifications by permission of the author from the original manuscript for M. E. Kauai, The NCSA Guide to Enterprise Security: Protecting Information Assets (New York: McGraw- Hill, 1996), Chapter 1 , pp. 2 5. 16. National Research Council, Computers at Risk: Safe Computing in the Information Age (Washington, DC: National Academy Press, 1991). Available as searchable open book at 17. G. S. Milieus, "The 7 Best Practices for Network Security in 2007," Network World Website, 2007, 18. M. E. Kauai (2005). "InfraGard is not a Deodorant," NetworkWorld Website, 2005, 19.
Image of page 20
  • Fall '16

{[ snackBarMessage ]}

Get FREE access by uploading your study materials

Upload your study materials now and get free access to over 25 million documents.

Upload now for FREE access Or pay now for instant access
Christopher Reinemann
"Before using Course Hero my grade was at 78%. By the end of the semester my grade was at 90%. I could not have done it without all the class material I found."
— Christopher R., University of Rhode Island '15, Course Hero Intern

Ask a question for free

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern