Introduction; Access control; Automates teller machines (ATM's); Backup procedures; Biometrics; Building security systems; Computer crime; Computer crime insurance; computer fraud; Contingency planning; copy protection; Data protection; Distributed systems, Document security; EFTPOS; Electromagnet radiation; Encryption algorithms; Fault-tolerant computing; Formal methods Hacking; Key management; Legal aspects of computer security; MS-DOS: an insecure operating system; Multi-level security and trusted systems; Networks; Personal computers, Personnel security; physical security; Public Key cryptography; Risk analysis; Security in banking, Security in hardware or software form; security tokens, software methods; standards; Telecommunications; Unix system security; Viruses.