Written primarily to help business executives and information systems professionals, this text addresses a wide range of computer security issues including: company security policies; data preservation and protection; hardware and software protection; and contingency planning.