Search Results

You searched for: subject "Electronic data processing+Security measures.+United States." Remove constraint

Search Results

Cover image for Military and civilian control of computer security issues

Military and civilian control of computer security issues

Location Call # Status
Joyner - Fed Docs Stacks Y 4.G 74/7:M 59/17 ✔ Available
Cover image for Information security

Information security

Location
Access Content Online
Cover image for Cyber-threats, information warfare, and critical infrastructure protection

Cyber-threats, information warfare, and critical infrastructure protection

Location Call # Status
Joyner - General Stacks UA929.95.E43 C67 2002 ✔ Available
Cover image for Department of Defense trusted computer system evaluation criteria

Department of Defense trusted computer system evaluation criteria

Location Call # Status
Joyner - Fed Docs Stacks D 1.2:C 73/8/985-2 ✔ Available
Cover image for A Guide to understanding trusted distribution in trusted systems

A Guide to understanding trusted distribution in trusted systems

Location Call # Status
Joyner - Fed Docs Stacks D 1.79/4:008/VER.1 ✔ Available
Cover image for A Guide to understanding identification and authentication in trusted systems

A Guide to understanding identification and authentication in trusted systems

Location Call # Status
Joyner - Fed Docs Stacks D 1.79/4:017/VER.1 ✔ Available
Cover image for Computer security awareness training

Computer security awareness training

Location Call # Status
Joyner - Fed Docs Stacks ASK AT REFERENCE DESK ✔ Available
Cover image for Problems associated with computer technology in Federal programs and private industry

Problems associated with computer technology in Federal programs and private industry

Location Call # Status
Joyner - Fed Docs Stacks Y 4.G 74/6:C 73/11 ✔ Available